SlideShare ist ein Scribd-Unternehmen logo
1 von 358
Downloaden Sie, um offline zu lesen
Nagios Core Version 3.x Documentation
http://www.nagios.org
Copyright © 2009 Nagios Core Development Team and Community Contributors.
Copyright © 1999-2009 Ethan Galstad.
Portions copyright by Nagios Community members. See the THANKS file for more information.
Last Updated: 06-16-2009
[ Table of Contents ]
Nagios, Nagios Core, NRPE, NSCA, and the Nagios logo are trademarks, servicemarks, registered
servicemarks or registered trademarks of Nagios Enterprises. All other trademarks, servicemarks,
registered trademarks, and registered servicemarks mentioned herein may be the property of their
respective owner(s). The information contained herein is provided AS IS with NO WARRANTY OF
ANY KIND, INCLUDING THE WARRANTY OF DESIGN, MERCHANTABILITY, AND FITNESS FOR
A PARTICULAR PURPOSE.
1
Nagios Core 3.x Documentation
Table of Contents
About
What is Nagios?
System requirements
Licensing
Downloading the latest version
Release Notes
What’s new in this version
Known issues
Support
Nagios Support Portal
Nagios Community Wiki
Getting Started
Advice for beginners
Quickstart installation guide
Upgrading from previous versions
How to monitor a Windows machine
How to monitor a Linux/Unix machine
How to monitor a Netware server
How to monitor a network printer
How to monitor a router/switch
How to monitor a publicly available service (HTTP, FTP, SSH, etc.)
Configuring Nagios
Configuration overview
Main configuration file options
Object configuration overview
Object definitions
CGI configuration file options
Configuring authorization for the CGIs
Running Nagios
Verifying your configuration
Starting and stopping Nagios
The Basics
Plugins
Macros and how they work
Standard macros available in Nagios
Host checks
Service checks
Active checks
Passive checks
State types
Time periods
Determining status and reachability of network hosts
Notifications
2
Information on the CGIs
Advanced Topics
External commands
Event handlers
Volatile services
Service and host result freshness checks
Distributed monitoring
Redundant and failover monitoring
Detection and handling of state flapping
Notification escalations
On-call notification rotations
Monitoring service and host clusters
Host and service dependencies
State stalking
Performance data
Scheduled host and service downtime
Using the embedded Perl interpreter
Adaptive monitoring
Predictive dependency checks
Cached checks
Passive host state translation
Check scheduling
Custom CGI headers and footers
Object inheritance
Time-saving tips for object definitions
Security and Performance Tuning
Security considerations
Enhanced CGI security and authentication
Tuning Nagios for maximum performance
Fast startup options
Large installation tweaks
Using the nagiostats utility
Graphing Nagios performance statistics
Integration With Other Software
Integration Overview
SNMP Traps
TCP Wrappers
Nagios Addons
NRPE
NSCA
NDOUtils
Other addons
Nagios Exchange
Development
Plugin API
Developing Plugins For Use With Embedded Perl
3
About Nagios
Up To: Contents
See Also: Quickstart Installation Guides
Nagios Overview
More information about Nagios - including features, case studies, and technical specifications can be
found online at www.nagios.org/about/.
What Is Nagios?
Nagios® is a system and network monitoring application. It watches hosts and services that you specify,
alerting you when things go bad and when they get better.
Nagios was originally designed to run under Linux, although it should work under most other unices as
well.
Some of the many features of Nagios include:
Monitoring of network services (SMTP, POP3, HTTP, NNTP, PING, etc.)
Monitoring of host resources (processor load, disk usage, etc.)
Simple plugin design that allows users to easily develop their own service checks
Parallelized service checks
Ability to define network host hierarchy using "parent" hosts, allowing detection of and distinction
between hosts that are down and those that are unreachable
Contact notifications when service or host problems occur and get resolved (via email, pager, or
user-defined method)
Ability to define event handlers to be run during service or host events for proactive problem
resolution
Automatic log file rotation
Support for implementing redundant monitoring hosts
Optional web interface for viewing current network status, notification and problem history, log
file, etc.
System Requirements
The only requirement of running Nagios is a machine running Linux (or UNIX variant) and a C compiler. You
will probably also want to have TCP/IP configured, as most service checks will be performed over the
network.
You are not required to use the CGIs included with Nagios. However, if you do decide to use them, you
will need to have the following software installed...
1. A web server (preferrably Apache)
2. Thomas Boutell’s gd library version 1.6.3 or higher (required by the statusmap and trends CGIs)
4
Licensing
Nagios is licensed under the terms of the GNU General Public License Version 2 as published by the
Free Software Foundation. This gives you legal permission to copy, distribute and/or modify Nagios
under certain conditions. Read the ’LICENSE’ file in the Nagios distribution or read the online version of
the license for more details.
Nagios is provided AS IS with NO WARRANTY OF ANY KIND, INCLUDING THE WARRANTY OF
DESIGN, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgements
Several people have contributed to Nagios by either reporting bugs, suggesting improvements, writing
plugins, etc. A list of some of the many contributors to the development of Nagios can be found in the
THANKS file in the root of the Nagios distribution.
Downloading The Latest Version
You can check for new versions of Nagios at http://www.nagios.org.
Nagios and the Nagios logo are trademarks of Nagios Enterprises, LLC. All other trademarks,
servicemarks, registered trademarks, and registered servicemarks may be the property of their
respective owner(s).
5
What’s New in Nagios Core 3.x
Up To: Contents
See Also: Known Issues
Important: Make sure you read through the documentation and the FAQs at support.nagios.com
before sending a question to the mailing lists.
Change Log
The change log for Nagios can be found online at http://www.nagios.org/development/history or in
the Changelog file in the root directory of the source code distribution.
Changes and New Features
1. Documentation:
Doc updates - I’m slowly making my way through rewriting most all portions of the
documentation. This is going to take a while, as (1) there’s a lot of documentation and (2)
writing documentation is not my favorite thing in the world. Expect some portions of the docs
to be different than others for a while. I hope the changes I’m making will make things
clearer/easier for new and seasoned Nagios users alike.
2. Macros:
New macros - New macros have been added, including: $TEMPPATH$,
$LONGHOSTOUTPUT$, $LONGSERVICEOUTPUT$, $HOSTNOTIFICATIONID$,
$SERVICENOTIFICATIONID$, $HOSTEVENTID$, $SERVICEEVENTID$,
$SERVICEISVOLATILE$, $LASTHOSTEVENTID$, $LASTSERVICEEVENTID$,
$HOSTDISPLAYNAME$, $SERVICEDISPLAYNAME$, $MAXHOSTATTEMPTS$,
$MAXSERVICEATTEMPTS$, $TOTALHOSTSERVICES$, $TOTALHOSTSERVICESOK$,
$TOTALHOSTSERVICESWARNING$, $TOTALHOSTSERVICESUNKNOWN$,
$TOTALHOSTSERVICESCRITICAL$, $CONTACTGROUPNAME$,
$CONTACTGROUPNAMES$, $CONTACTGROUPALIAS$, $CONTACTGROUPMEMBERS$,
$NOTIFICATIONRECIPIENTS$, $NOTIFICATIONISESCALATED$,
$NOTIFICATIONAUTHOR$, $NOTIFICATIONAUTHORNAME$,
$NOTIFICATIONAUTHORALIAS$, $NOTIFICATIONCOMMENT$, $EVENTSTARTTIME$,
$HOSTPROBLEMID$, $LASTHOSTPROBLEMID$, $SERVICEPROBLEMID$,
$LASTSERVICEPROBLEMID$, $LASTHOSSTATE$, $LASTHOSTSTATEID$,
$LASTSERVICESTATE$, $LASTSERVICESTATEID$. Two special on-demand time macros
have also been added: $ISVALIDTIME:$ and $NEXTVALIDTIME:$.
Removed macros - The old $NOTIFICATIONNUMBER$ macro has been deprecated in favor of
new $HOSTNOTIFICATIONNUMBER$ and $SERVICENOTIFICATIONNUMBER$ macros.
Changes - The $HOSTNOTES$ and $SERVICENOTES$ macros may now contain macros
themselves, just like the $HOSTNOTESURL$, $HOSTACTIONURL$, $SERVICENOTESURL$
and $SERVICEACTIONURL$ macros.
Macros are normally available as environment variables when check, event handler,
notification, and other commands are run. This can be rather CPU intensive in large Nagios
installations, so you can disable this behavior with the enable_environment_macros option.
Macro information can be found here.
6
3. Scheduled Downtime:
Scheduled downtime entries are no longer stored in their own file (previously specified with a
downtime_file directive in the main configuration file). Current and retained scheduled
downtime entries are now stored in the status file and retention file, respectively.
4. Comments:
Host and service comments are no longer stored in their own file (previously specified with a
comment_file directive in the main configuration file). Current and retained comments are now
stored in the status file and retention file, respectively.
Acknowledgement comments that are marked as non-persistent are now only deleted when the
acknowledgement is removed. They were previously automatically deleted when Nagios
restarted, which was not ideal.
5. State Retention Data:
Status information for individual contacts is now retained across program restarts.
Comment and downtime IDs are now retained across program restarts and should be unique
unless the retention data is deleted or ignored.
Added retained_host_attribute_mask and retained_service_attribute_mask variables to control
what host/service attributes are retained globally across program restarts.
Added retained_process_host_attribute_mask and retained_process_service_attribute_mask
variables to control what process attributes are retained across program restarts.
Added retained_contact_host_attribute_mask and retained_contact_service_attribute_mask
variables to control what contact attributes are retained globally across program restarts.
6. Flap Detection:
Added flap_detection_options directive to host and service definitions to allow you to specify
what host/service states should be used by the flap detection logic (by default all states are
used).
Percent state change and state history are now retained and recorded even when flap detection
is disabled.
Hosts and services are immediately checked for flapping when flap detection is enabled
program-wide.
Hosts and services that are flapping when flap detection is disabled program-wide are now
logged.
More information on flap detection can be found here.
7. External Commands:
Added a new PROCESS_FILE external command to allow processing of external commands
found in an external (regular) file. Useful for processing large amounts of passive checks with
long output, or for scripting regular commands. More information can be found here.
Custom commands may now be submitted to Nagios. Custom command names are prefixed
with an underscore and are not processed internally by the Nagios daemon. They may,
however, be processed by a loaded NEB module.
The check_external_commands option is now enabled by default, which means Nagios is
configured to check for external "commands out of the box". All 2.x and earlier versions of
Nagios had this option disabled by default.
8. Status Data:
Contact status information (last notification times, notifications enabled/disabled, etc.) is now
saved in the status and retention files, although it is not processed by the CGIs.
9. Embedded Perl:
Added new enable_embedded_perl and use_embedded_perl_implicitly variables to control use
of the embedded Perl interpreter.
Perl scripts/plugins can now explicitly tell Nagios whether or not they should be run under the
embedded Pel interpreter. This is useful if you have troublesome scripts that don’t function
well under the ePN.
More information about these new options can be found here.
7
10. Adaptive Monitoring:
The check timeperiod for hosts and services can now be modified on-the-fly with the
appropriate external command (CHANGE_HOST_CHECK_TIMEPERIOD or
CHANGE_SVC_CHECK_TIMEPERIOD). Look here for available adaptive monitoring
commands.
11. Notifications:
A first_notification_delay option has been added to host and service definitions to (what else)
introduce a delay between when a host/service problem first occurs and when the first
problem notification goes out. In previous versions you had to use some mighty config-fu with
escalations to accomplish this. Now this feature is available to normal mortals.
Notifications are now sent out for hosts/services that are flapping when flap detection is
disabled on a host- or service-specific basis or on a program-wide basis. The
$NOTIFICATIONTYPE$ macro will be set to "FLAPPINGDISABLED" in this situation.
Notifications can now be sent out when scheduled downtime start, ends, and is cancelled for
hosts and services. The $NOTIFICATIONTYPE$ macro will be set to "DOWNTIMESTART",
"DOWNTIMEEND", or "DOWNTIMECANCELLED", respectively. In order to receive
notifications on scheduled downtime events, specify "s" or "downtime" in your contact, host,
and/or service notification options.
More information on notifications can be found here.
12. Object Definitions:
Service dependencies can now be created to easily define "same host" dependencies for
different services on one or more hosts. (Read more)
Extended host and service definitions (hostextinfo and serviceextinfo, respectively) have been
deprecated. All values that from extended definitions have been merged with host or service
definitions, as appropriate. Nagios 3 will continue to read and process older extended
information definitions, but will log a warning. Future versions of Nagios (4.x and later) will
not support separate extended info definitions.
New hostgroup_members, servicegroup_members, and contactgroup_members directives have been
added to hostgroup, servicegroup, and contactgroups definitions, respectively. This allows you
to include hosts, services, or contacts from sub-groups in your group definitions.
New notes, notes_url, and action_url have been added to hostgroup and servicegroup definition.
Contact definitions have the new host_notifications_enabled, service_notifications_enabled, and
can_submit_commands directives to better control notifications and determine whether or not
they can submit commands through the web interface.
Host and service dependencies now support an optional dependency_period directive. This
allows you to limit the times during which dependencies are valid.
The parallelize directive in service definitions is now deprecated and no longer used. All service
checks are run in parallel in Nagios 3.
There are no longer any inherent limitations on the length of host names or service
descriptions.
Extended regular expressions are now used if you enable the use_regexp_matching config
option. Regular expression matching is only used in certain object definition directives that
contain *, ?, +, or ..
A new initial_state directive has been added to host and service definitions, so you can tell
Nagios that a host/service should default to a specific state when Nagios starts, rather than UP
or OK (which is still the default).
13. Object Inheritance:
You can now inherit object variables/values from multiple templates by specifying more than
one template name in the use directive of object definitions. This can allow for some very
powerful (and complex) inheritance setups. (Read more)
Services now inherit contact groups, notification interval, and notification period from their
associated host if not otherwise specified. (Read more)
8
Host and service escalations now inherit contact groups, notification interval, and escalation
timeperiod from their associated host or service if not otherwise specified. (Read more)
String variables in host, service, and contact definitions can now be prevented from being
inherited by specifying a value of "null" (without quotes) for the value of the variable. (Read
more)
Most string variables in local object definitions can now be appended to the string values that
are inherited. This is quite handy in large configurations. (Read more)
14. Performance Improvements:
Add ability to precache object config files and exclude circular path detection checks from
verification process. This can speed up Nagios start time immensely in large environments!
Read more here.
A new use_large_installation_tweaks option has been added that should improve performance
in large Nagios installations. Read more about this here.
A number of internal improvements have been made with regards to how Nagios deals with
internal data structures and object (e.g. host and service) relationships. These improvements
should result in a speedup for larger installations.
New external_command_buffer_slots option has been added to allow you to more easily scale
Nagios in large environments. For best results you should consider using MRTG to graph
Nagios’ usage of buffer slots over time.
15. Plugin Output:
Multiline plugin output is now supported for host and service checks. Hooray! The plugin API
has been updated to support multiple lines of output in a manner that retains backward
compatability with older plugins. Additional lines of output (aside from the first line) are now
stored in new $LONGHOSTOUTPUT$ and $LONGSERVICEOUTPUT$ macros.
The maximum length of plugin output has been increased to 4K (from around 350 bytes in
previous versions). This 4K limit has been arbitrarily chosen to protect again runaway plugins
that dump back too much data to Nagios.
More information on the plugins, multiline output, and max plugin output length can be found
here.
16. Service Checks:
Nagios now checks for orphaned service checks by default.
Added a new enable_predictive_service_dependency_checks option to control whether or not
Nagios will initiate predictive check of service that are being depended upon (in dependency
definitions). Predictive checks help ensure that the dependency logic is as accurate as possible.
(Read more)
A new cached service check feature has been implemented that can significantly improve
performance for many people Instead of executing a plugin to check the status of a service,
Nagios can often use a cached service check result instead. More information on this can be
found here.
17. Host Checks:
Host checks are now run in parallel! Host checks used to be run in a serial fashion, which
meant they were a major holdup in terms of performance. No longer! (Read more)
Host check retries are now performed like service check retries. That is to say, host definitions
now have a new retry_interval that specifies how much time to wait before trying the host check
again. :-)
Regularly scheduled host checks now longer hinder performance. In fact, they can help to
increase performance with the new cached check logic (see below).
Added a new check_for_orphaned_hosts option to enable checks of orphaned host checks. This
is need now that host checks are run in parallel.
Added a new enable_predictive_host_dependency_checks option to control whether or not
Nagios will initiate predictive check of hosts that are being depended upon (in dependency
definitions). Predictive checks help ensure that the dependency logic is as accurate as possible.
9
(Read more)
A new cached host check feature has been implemented that can significantly improve
performance for many people Instead of executing a plugin to check the status of a host, Nagios can
often use a cached host check result instead. More information on this can be found here.
Passive host checks that have a DOWN or UNREACHABLE result can now be automatically
translated to their proper state from the point of view of the Nagios instance that receives them. This is
very useful in failover and distributed monitoring setups. More information on passive host check state
translation can be found here.
Passive host checks normally put a host into a HARD state. This can now be changed by
enabling the passive_host_checks_are_soft option.
18. Freshness checks:
A new freshness_threshold_latency option has been added to allow to you specify the number
of seconds that should be added to any host or service freshness threshold that is automatically
calculated by Nagios.
19. IPC:
The IPC mechanism that is used to transfer host/service check results back to the Nagios
daemon from (grand)child processes has changed! This should help to reduce load/latency
issues related to processing large numbers of passive checks in distributed monitoring
environments.
Check results are now transferred by writing check results to files in directory specified by the
check_result_path option. Files that are older than the max_check_result_file_age option will be
mercilessly deleted without further processing.
20. Timeperiods:
Timeperiods were overdue for a major overhaul and have finally been extended to allow for
date exceptions, skip dates (every 3 days), etc! This should help you out when defining
notification timeperiods for pager rotations.
More information on the new timeperiod directives can be found here and here.
21. Event Broker:
Updated NEB API version
Modified callback for adaptive program status data
Added callback for adaptive contact status data
Added precheck callbacks for hosts and services to allow modules to cancel/override internal
host/service checks.
22. Web Interface:
The main splash pages of the web interface are now PHP pages. This will require that you
install/enable PHP support on your system if it isn’t already.
Hostgroup and servicegroup summaries now show important/unimportant problem
breakdowns like the TAC CGI.
Minor layout changes to host and service detail views in extinfo CGI.
New check statistics and have been added to the "Performance Info" screen.
Added Splunk integration options to various CGIs. Integration is controlled by the
enable_splunk_integration and splunk_url options in the CGI config file.
Added new notes_url_target and action_url_target options to control what frame notes and
action URLs are opened in.
Added new lock_author_names option to prevent alteration of author names when users
submit comments, acknowledgements, and scheduled downtime.
23. Debugging Info:
The DEBUGx compile options available in the configure script have been removed.
Debugging information can now be written to a separate debug file, which is automatically
rotated when it reaches a user-defined size. This should make debugging problems much
easier, as you don’t need to recompile Nagios. Full support for writing debugging information
to file is being added during the alpha development phase, so it may not be complete when you
10
try it.
Variables that affect the debug log are debug_file, debug_level, debug_verbosity, and
max_debug_file_size.
24. Update Checks:
Nagios will now check approximately once a day to see if a new version is available. This is
useful to keep on top of security patches and new releases. Update notices will appear in the
web interface.
Variables that affect the update check are check_for_updates and bare_update_check.
25. Misc:
Temp path variable - A new temp_path variable has been added to specify a scratch directory
that Nagios can use for temporary scratch space.
Unique notification and event ID numbers - A unique ID number is now assigned to each
host and service notification. Another unique ID is now assigned to all host and service state
changes as well. The unique IDs can be accessed using the following respective macros:
$HOSTNOTIFICATIONID$, $SERVICENOTIFICATIONID$, $HOSTEVENTID$,
$SERVICEEVENTID$, $LASTHOSTEVENTID$, $LASTSERVICEEVENTID$.
New macros - A few new macros (other than those already mentioned elsewhere above) have
been added. They include $HOSTGROUPNAMES$, $SERVICEGROUPNAMES$,
$HOSTACKAUTHORNAME$, $HOSTACKAUTHORALIAS$,
$SERVICEACKAUTHORNAME$, and $SERVICEACKAUTHORALIAS$.
Reaper frequency - The old service_reaper_frequency variable has been renamed to
check_result_reaper_frequency, as it is now also used to process host check results.
Max reaper time - A new max_check_result_reaper_time variable has been added to limit the
amount of time a single reaper event is allowed to run.
Fractional intervals - Fractional notification and check intervals (e.g. "3.5" minutes) are now
supported in host, service, host escalation, and service escalation definitions.
Escaped command arguments - You can now pass bang (!) characters in your command
arguments by escaping them with a backslash (). If you need to include backslashes in your
command arguments, they should also be escaped with a backslash.
Multiline system command output - Nagios will now read multiple lines out output from
system commands it runs (notification scripts, etc.), up to 4K. This matches the limits on plugin
output mentioned earliar. Output from system commands is not directly processed by Nagios,
but support for it is there nonetheless.
Better scheduling information - More detailed information is given when Nagios is executed
with the -s command line option. This information can be used to help reduce the time it takes
to start/restart Nagios.
Aggregated status file updates - The old aggregate_status_updates option has been removed. All
status file updates are now aggregated at a minimum interval of 1 second.
New performance data file mode - A new "p" option has been added to the
host_perfdata_file_mode and service_perfdata_file_mode options. This new mode will open
the file in non-blocking read/write mode, which is useful for pipes.
Timezone offset - A new use_timezone option has been added to allow you to run different
instances of Nagios in timezones different from the local zone.
11
Known Issues
Up To: Contents
See Also: What’s New
Known Issues
1. Timeperiods:
Exclusions and Host/Service Checks - There is a bug in the service/host check scheduling logic
that rears its head when you use timeperiod definitions that use the exclude directive. The
problem occurs when Nagios Core tries to re-schedule the next check. In this case, the
scheduling logic may incorrectly schedule the next check further out in the future than it
should. In essence, it skips over the (missing) logic where it could determine an earlier possible
time using the exception times. Imperfect Solution: Don’t use timeperiod definitions that
exclude other timeperods for your host/service check periods. A fix is being worked on, and
will hopefully make it into a 3.4.x release.
12
Advice for Beginners
Up To: Contents
See Also: Quickstart Installation Guide
Congratulations on choosing Nagios! Nagios is quite powerful and flexible, but it can take a lot of work
to get it configured just the way you’d like. Once you become familiar with how it works and what it can
do for you, you’ll never want to be without it. :-) Here are some important things to keep in mind for
first-time Nagios users:
1. Relax - it’s going to take some time. Don’t expect to be able to get things working exactly the way
you want them right off the bat. it’s not that easy. Setting up Nagios can involve a bit of work -
partly because of the options that Nagios offers, partly because you need to know what to monitor
on your network (and how best to do it).
2. Use the quickstart instructions. The quickstart installation guide is designed to get most new users
up and running with a basic Nagios setup fairly quickly. Within 20 minutes you can have Nagios
installed and monitoring your local system. Once that’s complete, you can move on to learning how
to configure Nagios to do more.
3. Read the documentation. Nagios can be tricky to configure when you’ve got a good grasp of what’s
going on, and nearly impossible if you don’t. Make sure you read the documentation (particularly
the sections on "Configuring Nagios" and "The Basics"). Save the advanced topics for when you’ve
got a good understanding of the basics.
4. Seek the help of others. If you’ve read the documentation, reviewed the sample config files, and are
still having problems, send an email message describing your problems to the nagios-users mailing
list. Due to the amount of work that I have to do for this project, I am unable to answer most of the
questions that get sent directly to me, so your best source of help is going to be the mailing list. If
you’ve done some background reading and you provide a good problem description, odds are that
someone will give you some pointers on getting things working properly. More information on
subscribing to the mailing lists or searching the list archives can be found at
http://www.nagios.org/support/.
13
Nagios Quickstart Installation Guides
Up To: Contents
See Also: Upgrading Nagios, Configuration Overview, Security Considerations
About Nagios
Visit www.nagios.org/about/ for more information on Nagios - including features, capabilities, and
technical specifications.
Installation Introduction
These quickstart guides are intended to provide you with simple instructions on how to install Nagios
from source (code) and have it monitoring your local machine inside of 20 minutes. No advanced
installation options are discussed here - just the basics that will work for 95% of users who want to get
started.
Installation Guides
Quickstart installation guides are currently available for the following Linux distributions:
Fedora Quickstart
openSUSE Quickstart
Ubuntu Quickstart
You can also find additional quickstart guides on the Nagios Community Wiki. Can’t find a quickstart
for your particular OS? Write one and post it to the wiki for others!
If you are installing Nagios on an operating system or Linux distribution that isn’t listed above, read the
Fedora quickstart for an overview of what you’ll need to do. Command names, paths, etc. vary widely
across different OSes/distributions, so you’ll likely need to tweak the installation docs a bit to work for
your particular case.
Post-Installation Modifications
Once you get Nagios installed and running properly, you’ll no doubt want to start monitoring more
than just your local machine. Check out the following docs for how to go about monitoring other
things...
Monitoring Windows machines
Monitoring Linux/Unix machines
Monitoring Netware servers
Monitoring routers/switches
Monitoring network printers
Monitoring publicly available services (HTTP, FTP, SSH, etc.)
Enhance Nagios With Community Addons
14
Hundreds of community-developed addons provide additional GUIs and reporting, monitoring, and
notification functionalities for Nagios. Visit the Nagios Exchange website at exchange.nagios.org to see
some really cool things you can use to trick out your Nagios installation.
Nagios Support Portal
Visit the Nagios Support portal at support.nagios.com for additional documentation, FAQs, and
professional Nagios support plans.
Nagios and the Nagios logo are trademarks, servicemarks, registered servicemarks or registered
trademarks of Nagios Enterprises.
15
Upgrading Nagios
Up To: Contents
See Also: Quickstart Installation Guide
Contents
Upgrading from previous Nagios 3.x releases
Upgrading from Nagios 2.x
Upgrading from an RPM installation
Upgrading From Previous Nagios 3.x Releases
As newer alpha, beta, and stable releases of Nagios 3.x are released, you should strongly consider
upgrading as soon as possible. Newer releases usually contain critical bug fixes, so its important to stay
up to date. Assuming you’ve already installed Nagios from source code as described in the quickstart
guide, you can install newer versions of Nagios 3.x easily. You don’t even need root access to do it, as
everything that needed to be done as root was done during the initial install. Here’s the upgrade
process...
Make sure you have a good backup of your existing Nagios installation and configuration files. If
anything goes wrong or doesn’t work, this will allow you to rollback to your old version.
Become the nagios user. Debian/Ubuntu users should use sudo -s nagios.
su -l nagios
Removed the following old HTML files that were used by the web frontend. They have been replaced by
PHP equivalents.
rm /usr/local/nagios/share/{main,side,index}.html
Download the source code tarball of the latest version of Nagios (visit
http://www.nagios.org/download/ for the link to the latest version).
wget http://osdn.dl.sourceforge.net/sourceforge/nagios/nagios-3.x.tar.gz
Extract the Nagios source code tarball.
tar xzf nagios-3.x.tar.gz
cd nagios-3.x
Run the Nagios configure script, passing the name of the group used to control external command file
permissions like so:
./configure --with-command-group=nagcmd
Compile the Nagios source code.
16
make all
Install updated binaries, documentation, and web web interface. Your existing configuration files will
not be overwritten by this step.
make install
Verify your configuration files. Correct any errors shown here before proceeding with the next step.
/usr/local/nagios/bin/nagios -v /usr/local/nagios/etc/nagios.cfg
Restart Nagios. Debian/Ubuntu users should use /etc/init.d/nagios restart.
/sbin/service nagios restart
That’s it - you’re done!
Upgrading From Nagios 2.x
It shouldn’t be too difficult to upgrade from Nagios 2.x to Nagios 3. The upgrade is essentially the same
as what is described above for upgrading to newer 3.x releases. You will, however, have to change your
configuration files a bit so they work with Nagios 3:
The old service_reaper_frequency variable in the main config file has been renamed to
check_result_reaper_frequency.
The old $NOTIFICATIONNUMBER$ macro has been deprecated in favor of new
$HOSTNOTIFICATIONNUMBER$ and $SERVICENOTIFICATIONNUMBER$ macros.
The old parallelize directive in service definitions is now deprecated and no longer used, as all
service checks are run in parallel.
The old aggregate_status_updates option has been removed. All status file updates are now
aggregated at a minimum interval of 1 second.
Extended host and extended service definitions have been deprecated. They are still read and
processed by Nagios, but it is recommended that you move the directives found in these definitions
to your host and service definitions, respectively.
The old downtime_file file variable in the main config file is no longer supported, as scheduled
downtime entries are now saved in the retention file. To preserve existing downtime entries, stop
Nagios 2.x and append the contents of your old downtime file to the retention file.
The old comment_file file variable in the main config file is no longer supported, as comments are
now saved in the retention file. To preserve existing comments, stop Nagios 2.x and append the
contents of your old comment file to the retention file.
Also make sure to read the "What’s New" section of the documentation. It describes all the changes that
were made to the Nagios 3 code since the latest stable release of Nagios 2.x. Quite a bit has changed, so
make sure you read it over.
Upgrading From an RPM Installation
If you currently have an RPM- or Debian/Ubuntu APT package-based installation of Nagios and you
would like to transition to installing Nagios from the official source code distribution, here’s the basic
process you should follow:
1. Stop Nagios
2. Backup your existing Nagios installation
Configuration files
Main config file (usually nagios.cfg)
Resource config file (usually resource.cfg)
17
CGI config file (usually cgi.cfg)
All your object definition files
Retention file (usually retention.dat)
Current Nagios log file (usually nagios.log)
Archived Nagios log files
3. Uninstall the original RPM or APT package
4. Install Nagios from source by following the quickstart guide
5. Restore your original Nagios configuration files, retention file, and log files
6. Verify your configuration and start Nagios
Note that different RPMs or APT packages may install Nagios in different ways and in different
locations. Make sure you’ve backed up all your critical Nagios files before removing the original RPM or
APT package, so you can revert back if you encounter problems.
18
Monitoring Windows Machines
Up To: Contents
See Also: Quickstart Installation Guide, Monitoring Publicly Available Services
Introduction
This document describes how you can monitor "private" services and attributes of Windows machines,
such as:
Memory usage
CPU load
Disk usage
Service states
Running processes
etc.
Publicly available services that are provided by Windows machines (HTTP, FTP, POP3, etc.) can be
monitored easily by following the documentation on monitoring publicly available services.
Note: These instructions assume that you’ve installed Nagios according to the quickstart guide.
The sample configuration entries below reference objects that are defined in the sample config files
(commands.cfg, templates.cfg, etc.) that are installed if you follow the quickstart.
Overview
Monitoring private services or attributes of a Windows machine requires that you install an agent on it.
This agent acts as a proxy between the Nagios plugin that does the monitoring and the actual service or
attribute of the Windows machine. Without installing an agent on the Windows box, Nagios would be
unable to monitor private services or attributes of the Windows box.
For this example, we will be installing the NSClient++ addon on the Windows machine and using the
check_nt plugin to communicate with the NSClient++ addon. The check_nt plugin should already be
installed on the Nagios server if you followed the quickstart guide.
19
Other Windows agents (like NC_Net) could be used instead of NSClient++ if you wish - provided you
change command and service definitions, etc. a bit. For the sake of simplicity I will only cover using the
NSClient++ addon in these instructions.
Steps
There are several steps you’ll need to follow in order to monitor a new Windows machine. They are:
1. Perform first-time prerequisites
2. Install a monitoring agent on the Windows machine
3. Create new host and service definitions for monitoring the Windows machine
4. Restart the Nagios daemon
What’s Already Done For You
To make your life a bit easier, a few configuration tasks have already been done for you:
A check_nt command definition has been added to the commands.cfg file. This allows you to use the
check_nt plugin to monitor Window services.
A Windows server host template (called windows-server) has already been created in the templates.cfg
file. This allows you to add new Windows host definitions in a simple manner.
The above-mentioned config files can be found in the /usr/local/nagios/etc/objects/ directory. You can
modify the definitions in these and other definitions to suit your needs better if you’d like. However, I’d
recommend waiting until you’re more familiar with configuring Nagios before doing so. For the time
being, just follow the directions outlined below and you’ll be monitoring your Windows boxes in no
time.
Prerequisites
The first time you configure Nagios to monitor a Windows machine, you’ll need to do a bit of extra
work. Remember, you only need to do this for the *first* Windows machine you monitor.
Edit the main Nagios config file.
vi /usr/local/nagios/etc/nagios.cfg
Remove the leading pound (#) sign from the following line in the main configuration file:
#cfg_file=/usr/local/nagios/etc/objects/windows.cfg
Save the file and exit.
What did you just do? You told Nagios to look to the /usr/local/nagios/etc/objects/windows.cfg to find
additional object definitions. That’s where you’ll be adding Windows host and service definitions. That
configuration file already contains some sample host, hostgroup, and service definitions. For the *first*
Windows machine you monitor, you can simply modify the sample host and service definitions in that
file, rather than creating new ones.
Installing the Windows Agent
Before you can begin monitoring private services and attributes of Windows machines, you’ll need to
install an agent on those machines. I recommend using the NSClient++ addon, which can be found at
http://sourceforge.net/projects/nscplus. These instructions will take you through a basic installation of
the NSClient++ addon, as well as the configuration of Nagios for monitoring the Windows machine.
20
1. Download the latest stable version of the NSClient++ addon from
http://sourceforge.net/projects/nscplus
2. Unzip the NSClient++ files into a new C:NSClient++ directory
3. Open a command prompt and change to the C:NSClient++ directory
4. Register the NSClient++ system service with the following command:
nsclient++ /install
5. Install the NSClient++ systray with the following command (’SysTray’ is case-sensitive):
nsclient++ SysTray
6. Open the services manager and make sure the NSClientpp service is allowed to interact with the
desktop (see the ’Log On’ tab of the services manager). If it isn’t already allowed to interact with the
desktop, check the box to allow it to.
7. Edit the NSC.INI file (located in the C:NSClient++ directory) and make the following changes:
Uncomment all the modules listed in the [modules] section, except for CheckWMI.dll and
RemoteConfiguration.dll
Optionally require a password for clients by changing the ’password’ option in the [Settings]
section.
Uncomment the ’allowed_hosts’ option in the [Settings] section. Add the IP address of the Nagios
server to this line, or leave it blank to allow all hosts to connect.
Make sure the ’port’ option in the [NSClient] section is uncommented and set to ’12489’ (the default
port).
8. Start the NSClient++ service with the following command:
21
nsclient++ /start
9. If installed properly, a new icon should appear in your system tray. It will be a yellow circle with a
black ’M’ inside.
10. Success! The Windows server can now be added to the Nagios monitoring configuration...
Configuring Nagios
Now it’s time to define some object definitions in your Nagios configuration files in order to monitor the
new Windows machine.
Open the windows.cfg file for editing.
vi /usr/local/nagios/etc/objects/windows.cfg
Add a new host definition for the Windows machine that you’re going to monitor. If this is the *first*
Windows machine you’re monitoring, you can simply modify the sample host definition in windows.cfg.
Change the host_name, alias, and address fields to appropriate values for the Windows box.
define host{
use windows-server ; Inherit default values from a Windows server template (make sure you keep this line!)
host_name winserver
alias My Windows Server
address 192.168.1.2
}
Good. Now you can add some service definitions (to the same configuration file) in order to tell Nagios
to monitor different aspects of the Windows machine. If this is the *first* Windows machine you’re
monitoring, you can simply modify the sample service definitions in windows.cfg.
Note: Replace "winserver" in the example definitions below with the name you specified in the
host_name directive of the host definition you just added.
Add the following service definition to monitor the version of the NSClient++ addon that is running on
the Windows server. This is useful when it comes time to upgrade your Windows servers to a newer
version of the addon, as you’ll be able to tell which Windows machines still need to be upgraded to the
latest version of NSClient++.
define service{
use generic-service
host_name winserver
service_description NSClient++ Version
check_command check_nt!CLIENTVERSION
}
Add the following service definition to monitor the uptime of the Windows server.
22
define service{
use generic-service
host_name winserver
service_description Uptime
check_command check_nt!UPTIME
}
Add the following service definition to monitor the CPU utilization on the Windows server and generate
a CRITICAL alert if the 5-minute CPU load is 90% or more or a WARNING alert if the 5-minute load is
80% or greater.
define service{
use generic-service
host_name winserver
service_description CPU Load
check_command check_nt!CPULOAD!-l 5,80,90
}
Add the following service definition to monitor memory usage on the Windows server and generate a
CRITICAL alert if memory usage is 90% or more or a WARNING alert if memory usage is 80% or
greater.
define service{
use generic-service
host_name winserver
service_description Memory Usage
check_command check_nt!MEMUSE!-w 80 -c 90
}
Add the following service definition to monitor usage of the C: drive on the Windows server and
generate a CRITICAL alert if disk usage is 90% or more or a WARNING alert if disk usage is 80% or
greater.
define service{
use generic-service
host_name winserver
service_description C: Drive Space
check_command check_nt!USEDDISKSPACE!-l c -w 80 -c 90
}
23
Add the following service definition to monitor the W3SVC service state on the Windows machine and
generate a CRITICAL alert if the service is stopped.
define service{
use generic-service
host_name winserver
service_description W3SVC
check_command check_nt!SERVICESTATE!-d SHOWALL -l W3SVC
}
Add the following service definition to monitor the Explorer.exe process on the Windows machine and
generate a CRITICAL alert if the process is not running.
define service{
use generic-service
host_name winserver
service_description Explorer
check_command check_nt!PROCSTATE!-d SHOWALL -l Explorer.exe
}
That’s it for now. You’ve added some basic services that should be monitored on the Windows box. Save
the configuration file.
Password Protection
If you specified a password in the NSClient++ configuration file on the Windows machine, you’ll need
to modify the check_nt command definition to include the password. Open the commands.cfg file for
editing.
vi /usr/local/nagios/etc/objects/commands.cfg
Change the definition of the check_nt command to include the "-s <PASSWORD>" argument (where
PASSWORD is the password you specified on the Windows machine) like this:
define command{
command_name check_nt
command_line $USER1$/check_nt -H $HOSTADDRESS$ -p 12489 -s PASSWORD -v $ARG1$ $ARG2$
}
Save the file.
Restarting Nagios
You’re done with modifying the Nagios configuration, so you’ll need to verify your configuration files
and restart Nagios.
24
If the verification process produces any errors messages, fix your configuration file before continuing.
Make sure that you don’t (re)start Nagios until the verification process completes without any errors!
25
Monitoring Linux/Unix Machines
Up To: Contents
See Also: Quickstart Installation Guide, Monitoring Publicly Available Services
Introduction
This document describes how you can monitor "private" services and attributes of Linux/UNIX servers,
such as:
CPU load
Memory usage
Disk usage
Logged in users
Running processes
etc.
Publicly available services that are provided by Linux servers (HTTP, FTP, SSH, SMTP, etc.) can be
monitored easily by following the documentation on monitoring publicly available services.
Note: These instructions assume that you’ve installed Nagios according to the quickstart guide.
The sample configuration entries below reference objects that are defined in the sample config files
(commands.cfg, templates.cfg, etc.) that are installed if you follow the quickstart.
Overview
[Note: This document has not been completed. I would recommend you read the documentation on the
NRPE addon for instructions on how to monitor a remote Linux/Unix server.]
There are several different ways to monitor attributes or remote Linux/Unix servers. One is by using
shared SSH keys and the check_by_ssh plugin to execute plugins on remote servers. This method will not
be covered here, but can result in high load on your monitoring server if you are monitoring hundreds
or thousands of services. The overhead of setting up/destroying SSH connections is the cause of this.
Another common method of monitoring remote Linux/Unix hosts is to use the NRPE addon. NRPE
allows you to execute plugins on remote Linux/Unix hosts. This is useful if you need to monitor local
resources/attributes like disk usage, CPU load, memory usage, etc. on a remote host.
26
27
Monitoring Netware Servers
Up To: Contents
See Also: Quickstart Installation Guide, Monitoring Publicly Available Services
Introduction
This document provides information on how you can monitor Novell Netware servers.
External Resources
You can find documentation on monitoring Netware servers with Nagios at Novell’s Cool Solutions site,
including:
MRTGEXT: NLM module for MRTG and Nagios
Nagios: Host and Service Monitoring Tool
Nagios and NetWare: SNMP-based Monitoring
Monitor DirXML/IDM Driver States with Nagios
Check NDS Login ability with Nagios
NDPS/iPrint Print Queue Monitoring by Nagios
check_gwiaRL Plugin for Nagios 2.0
Tip: When you visit Novell’s Cool Solutions site, search for "Nagios" to find more articles and
software components related to monitoring.
Thanks to Christian Mies, Rainer Brunold, and others for contributing Nagios and Netware
documentation, addons, etc. on the Novell site!
28
Monitoring Network Printers
Up To: Contents
See Also: Monitoring Publicly Available Services
Introduction
This document describes how you can monitor the status of networked printers. Specifically, HP
printers that have internal/external JetDirect cards/devices, or other print servers (like the Troy
PocketPro 100S or the Netgear PS101) that support the JetDirect protocol.
The check_hpjd plugin (which is part of the standard Nagios plugins distribution) allows you to monitor
the status of JetDirect-capable printers which have SNMP enabled. The plugin is capable of detecting the
following printer states:
Paper Jam
Out of Paper
Printer Offline
Intervention Required
Toner Low
Insufficient Memory
Open Door
Output Tray is Full
and more...
Note: These instructions assume that you’ve installed Nagios according to the quickstart guide.
The sample configuration entries below reference objects that are defined in the sample config files
(commands.cfg, templates.cfg, etc.) that are installed if you follow the quickstart.
Overview
29
Monitoring the status of a networked printer is pretty simple. JetDirect-enabled printers usually have
SNMP enabled, which allows Nagios to monitor their status using the check_hpjd plugin.
The check_hpjd plugin will only get compiled and installed if you have the net-snmp and net-snmp-utils
packages installed on your system. Make sure the plugin exists in /usr/local/nagios/libexec before you
continue. If it doesn’t, install net-snmp and net-snmp-utils and recompile/reinstall the Nagios plugins.
Steps
There are several steps you’ll need to follow in order to monitor a new network printer. They are:
1. Perform first-time prerequisites
2. Create new host and service definitions for monitoring the printer
3. Restart the Nagios daemon
What’s Already Done For You
To make your life a bit easier, a few configuration tasks have already been done for you:
A check_hpjd command definition has been added to the commands.cfg file. This allows you to use the
check_hpjd plugin to monitor network printers.
A printer host template (called generic-printer) has already been created in the templates.cfg file. This
allows you to add new printer host definitions in a simple manner.
The above-mentioned config files can be found in the /usr/local/nagios/etc/objects/ directory. You can
modify the definitions in these and other definitions to suit your needs better if you’d like. However, I’d
recommend waiting until you’re more familiar with configuring Nagios before doing so. For the time
being, just follow the directions outlined below and you’ll be monitoring your network printers in no
time.
Prerequisites
The first time you configure Nagios to monitor a network printer, you’ll need to do a bit of extra work.
Remember, you only need to do this for the *first* printer you monitor.
Edit the main Nagios config file.
vi /usr/local/nagios/etc/nagios.cfg
Remove the leading pound (#) sign from the following line in the main configuration file:
#cfg_file=/usr/local/nagios/etc/objects/printer.cfg
Save the file and exit.
What did you just do? You told Nagios to look to the /usr/local/nagios/etc/objects/printer.cfg to find
additional object definitions. That’s where you’ll be adding host and service definitions for the printer.
That configuration file already contains some sample host, hostgroup, and service definitions. For the
*first* printer you monitor, you can simply modify the sample host and service definitions in that file,
rather than creating new ones.
Configuring Nagios
You’ll need to create some object definitions in order to monitor a new printer.
30
Open the printer.cfg file for editing.
vi /usr/local/nagios/etc/objects/printer.cfg
Add a new host definition for the networked printer that you’re going to monitor. If this is the *first*
printer you’re monitoring, you can simply modify the sample host definition in printer.cfg. Change the
host_name, alias, and address fields to appropriate values for the printer.
define host{
use generic-printer ; Inherit default values from a template
host_name hplj2605dn ; The name we’re giving to this printer
alias HP LaserJet 2605dn ; A longer name associated with the printer
address 192.168.1.30 ; IP address of the printer
hostgroups allhosts ; Host groups this printer is associated with
}
Now you can add some service definitions (to the same configuration file) to monitor different aspects of
the printer. If this is the *first* printer you’re monitoring, you can simply modify the sample service
definition in printer.cfg.
Note: Replace "hplj2605dn" in the example definitions below with the name you specified in the
host_name directive of the host definition you just added.
Add the following service definition to check the status of the printer. The service uses the check_hpjd
plugin to check the status of the printer every 10 minutes by default. The SNMP community string used
to query the printer is "public" in this example.
define service{
use generic-service ; Inherit values from a template
host_name hplj2605dn ; The name of the host the service is associated with
service_description Printer Status ; The service description
check_command check_hpjd!-C public ; The command used to monitor the service
normal_check_interval 10 ; Check the service every 10 minutes under normal conditions
retry_check_interval 1 ; Re-check the service every minute until its final/hard state is determined
}
Add the following service definition to ping the printer every 10 minutes by default. This is useful for
monitoring RTA, packet loss, and general network connectivity.
define service{
use generic-service
host_name hplj2605dn
service_description PING
check_command check_ping!3000.0,80%!5000.0,100%
normal_check_interval 10
31
retry_check_interval 1
}
Save the file.
Restarting Nagios
Once you’ve added the new host and service definitions to the printer.cfg file, you’re ready to start
monitoring the printer. To do this, you’ll need to verify your configuration and restart Nagios.
If the verification process produces any errors messages, fix your configuration file before continuing.
Make sure that you don’t (re)start Nagios until the verification process completes without any errors!
32
Monitoring Routers and Switches
Up To: Contents
See Also: Monitoring Publicly Available Services
Introduction
This document describes how you can monitor the status of network switches and routers. Some
cheaper "unmanaged" switches and hubs don’t have IP addresses and are essentially invisible on your
network, so there’s not any way to monitor them. More expensive switches and routers have addresses
assigned to them and can be monitored by pinging them or using SNMP to query status information.
I’ll describe how you can monitor the following things on managed switches, hubs, and routers:
Packet loss, round trip average
SNMP status information
Bandwidth / traffic rate
Note: These instructions assume that you’ve installed Nagios according to the quickstart guide.
The sample configuration entries below reference objects that are defined in the sample config files
(commands.cfg, templates.cfg, etc.) that are installed when you follow the quickstart.
Overview
Monitoring switches and routers can either be easy or more involved - depending on what equipment
you have and what you want to monitor. As they are critical infrastructure components, you’ll no doubt
want to monitor them in at least some basic manner.
33
Switches and routers can be monitored easily by "pinging" them to determine packet loss, RTA, etc. If
your switch supports SNMP, you can monitor port status, etc. with the check_snmp plugin and
bandwidth (if you’re using MRTG) with the check_mrtgtraf plugin.
The check_snmp plugin will only get compiled and installed if you have the net-snmp and net-snmp-utils
packages installed on your system. Make sure the plugin exists in /usr/local/nagios/libexec before you
continue. If it doesn’t, install net-snmp and net-snmp-utils and recompile/reinstall the Nagios plugins.
Steps
There are several steps you’ll need to follow in order to monitor a new router or switch. They are:
1. Perform first-time prerequisites
2. Create new host and service definitions for monitoring the device
3. Restart the Nagios daemon
What’s Already Done For You
To make your life a bit easier, a few configuration tasks have already been done for you:
Two command definitions (check_snmp and check_local_mrtgtraf) have been added to the
commands.cfg file. These allows you to use the check_snmp and check_mrtgtraf plugins to monitor
network routers.
A switch host template (called generic-switch) has already been created in the templates.cfg file. This
allows you to add new router/switch host definitions in a simple manner.
The above-mentioned config files can be found in the /usr/local/nagios/etc/objects/ directory. You can
modify the definitions in these and other definitions to suit your needs better if you’d like. However, I’d
recommend waiting until you’re more familiar with configuring Nagios before doing so. For the time
being, just follow the directions outlined below and you’ll be monitoring your network routers/switches
in no time.
Prerequisites
The first time you configure Nagios to monitor a network switch, you’ll need to do a bit of extra work.
Remember, you only need to do this for the *first* switch you monitor.
Edit the main Nagios config file.
vi /usr/local/nagios/etc/nagios.cfg
Remove the leading pound (#) sign from the following line in the main configuration file:
#cfg_file=/usr/local/nagios/etc/objects/switch.cfg
Save the file and exit.
What did you just do? You told Nagios to look to the /usr/local/nagios/etc/objects/switch.cfg to find
additional object definitions. That’s where you’ll be adding host and service definitions for routers and
switches. That configuration file already contains some sample host, hostgroup, and service definitions.
For the *first* router/switch you monitor, you can simply modify the sample host and service
definitions in that file, rather than creating new ones.
Configuring Nagios
34
You’ll need to create some object definitions in order to monitor a new router/switch.
Open the switch.cfg file for editing.
vi /usr/local/nagios/etc/objects/switch.cfg
Add a new host definition for the switch that you’re going to monitor. If this is the *first* switch you’re
monitoring, you can simply modify the sample host definition in switch.cfg. Change the host_name, alias,
and address fields to appropriate values for the switch.
define host{
use generic-switch ; Inherit default values from a template
host_name linksys-srw224p ; The name we’re giving to this switch
alias Linksys SRW224P Switch ; A longer name associated with the switch
address 192.168.1.253 ; IP address of the switch
hostgroups allhosts,switches ; Host groups this switch is associated with
}
Monitoring Services
Now you can add some service definitions (to the same configuration file) to monitor different aspects of
the switch. If this is the *first* switch you’re monitoring, you can simply modify the sample service
definition in switch.cfg.
Note: Replace "linksys-srw224p" in the example definitions below with the name you specified in
the host_name directive of the host definition you just added.
Monitoring Packet Loss and RTA
Add the following service definition in order to monitor packet loss and round trip average between the
Nagios host and the switch every 5 minutes under normal conditions.
define service{
use generic-service ; Inherit values from a template
host_name linksys-srw224p ; The name of the host the service is associated with
service_description PING ; The service description
check_command check_ping!200.0,20%!600.0,60% ; The command used to monitor the service
normal_check_interval 5 ; Check the service every 5 minutes under normal conditions
retry_check_interval 1 ; Re-check the service every minute until its final/hard state is determined
}
This service will be:
CRITICAL if the round trip average (RTA) is greater than 600 milliseconds or the packet loss is 60%
or more
WARNING if the RTA is greater than 200 ms or the packet loss is 20% or more
OK if the RTA is less than 200 ms and the packet loss is less than 20%
35
Monitoring SNMP Status Information
If your switch or router supports SNMP, you can monitor a lot of information by using the check_snmp
plugin. If it doesn’t, skip this section.
Add the following service definition to monitor the uptime of the switch.
define service{
use generic-service ; Inherit values from a template
host_name linksys-srw224p
service_description Uptime
check_command check_snmp!-C public -o sysUpTime.0
}
In the check_command directive of the service definition above, the "-C public" tells the plugin that the
SNMP community name to be used is "public" and the "-o sysUpTime.0" indicates which OID should be
checked.
If you want to ensure that a specific port/interface on the switch is in an up state, you could add a
service definition like this:
define service{
use generic-service ; Inherit values from a template
host_name linksys-srw224p
service_description Port 1 Link Status
check_command check_snmp!-C public -o ifOperStatus.1 -r 1 -m RFC1213-MIB
}
In the example above, the "-o ifOperStatus.1" refers to the OID for the operational status of port 1 on the
switch. The "-r 1" option tells the check_snmp plugin to return an OK state if "1" is found in the SNMP
result (1 indicates an "up" state on the port) and CRITICAL if it isn’t found. The "-m RFC1213-MIB" is
optional and tells the check_snmp plugin to only load the "RFC1213-MIB" instead of every single MIB
that’s installed on your system, which can help speed things up.
That’s it for the SNMP monitoring example. There are a million things that can be monitored via SNMP,
so its up to you to decide what you need and want to monitor. Good luck!
Tip: You can usually find the OIDs that can be monitored on a switch by running the following
command (replace 192.168.1.253 with the IP address of the switch): snmpwalk -v1 -c public 192.168.1.253
-m ALL .1
Monitoring Bandwidth / Traffic Rate
If you’re monitoring bandwidth usage on your switches or routers using MRTG, you can have Nagios
alert you when traffic rates exceed thresholds you specify. The check_mrtgtraf plugin (which is included
in the Nagios plugins distribution) allows you to do this.
36
You’ll need to let the check_mrtgtraf plugin know what log file the MRTG data is being stored in, along
with thresholds, etc. In my example, I’m monitoring one of the ports on a Linksys switch. The MRTG log
file is stored in /var/lib/mrtg/192.168.1.253_1.log. Here’s the service definition I use to monitor the
bandwidth data that’s stored in the log file...
define service{
use generic-service ; Inherit values from a template
host_name linksys-srw224p
service_description Port 1 Bandwidth Usage
check_command check_local_mrtgtraf!/var/lib/mrtg/192.168.1.253_1.log!AVG!1000000,2000000!5000000,5000000!10
}
In the example above, the "/var/lib/mrtg/192.168.1.253_1.log" option that gets passed to the
check_local_mrtgtraf command tells the plugin which MRTG log file to read from. The "AVG" option tells
it that it should use average bandwidth statistics. The "1000000,2000000" options are the warning
thresholds (in bytes) for incoming traffic rates. The "5000000,5000000" are critical thresholds (in bytes) for
outgoing traffic rates. The "10" option causes the plugin to return a CRITICAL state if the MRTG log file
is older than 10 minutes (it should be updated every 5 minutes).
Save the file.
Restarting Nagios
Once you’ve added the new host and service definitions to the switch.cfg file, you’re ready to start
monitoring the router/switch. To do this, you’ll need to verify your configuration and restart Nagios.
If the verification process produces any errors messages, fix your configuration file before continuing.
Make sure that you don’t (re)start Nagios until the verification process completes without any errors!
37
Monitoring Publicly Available Services
Up To: Contents
See Also: Quickstart Installation Guide
Introduction
This document describes how you can monitor publicly available services, applications and protocols.
By "public" I mean services that are accessible across the network - either the local network or the greater
Internet. Examples of public services include HTTP, POP3, IMAP, FTP, and SSH. There are many more
public services that you probably use on a daily basis. These services and applications, as well as their
underlying protocols, can usually be monitored by Nagios without any special access requirements.
Private services, in contrast, cannot be monitored with Nagios without an intermediary agent of some
kind. Examples of private services associated with hosts are things like CPU load, memory usage, disk
usage, current user count, process information, etc. These private services or attributes of hosts are not
usually exposed to external clients. This situation requires that an intermediary monitoring agent be
installed on any host that you need to monitor such information on. More information on monitoring
private services on different types of hosts can be found in the documentation on:
Monitoring Windows machines
Monitoring Netware servers
Monitoring Linux/Unix machines
Tip: Occassionally you will find that information on private services and applications can be
monitored with SNMP. The SNMP agent allows you to remotely monitor otherwise private (and
inaccessible) information about the host. For more information about monitoring services using SNMP,
check out the documentation on monitoring switches and routers.
Note: These instructions assume that you’ve installed Nagios according to the quickstart guide.
The sample configuration entries below reference objects that are defined in the sample commands.cfg
and localhost.cfg config files.
Plugins For Monitoring Services
When you find yourself needing to monitor a particular application, service, or protocol, chances are
good that a plugin exists to monitor it. The official Nagios plugins distribution comes with plugins that
can be used to monitor a variety of services and protocols. There are also a large number of contributed
plugins that can be found in the contrib/ subdirectory of the plugin distribution. The
NagiosExchange.org website hosts a number of additional plugins that have been written by users, so
check it out when you have a chance.
If you don’t happen to find an appropriate plugin for monitoring what you need, you can always write
your own. Plugins are easy to write, so don’t let this thought scare you off. Read the documentation on
developing plugins for more information.
38
I’ll walk you through monitoring some basic services that you’ll probably use sooner or later. Each of
these services can be monitored using one of the plugins that gets installed as part of the Nagios plugins
distribution. Let’s get started...
Creating A Host Definition
Before you can monitor a service, you first need to define a host that is associated with the service. You
can place host definitions in any object configuration file specified by a cfg_file directive or placed in a
directory specified by a cfg_dir directive. If you have already created a host definition, you can skip this
step.
For this example, lets say you want to monitor a variety of services on a remote host. Let’s call that host
remotehost. The host definition can be placed in its own file or added to an already exiting object
configuration file. Here’s what the host definition for remotehost might look like:
define host{
use generic-host ; Inherit default values from a template
host_name remotehost ; The name we’re giving to this host
alias Some Remote Host ; A longer name associated with the host
address 192.168.1.50 ; IP address of the host
hostgroups allhosts ; Host groups this host is associated with
}
Now that a definition has been added for the host that will be monitored, we can start defining services
that should be monitored. As with host definitions, service definitions can be placed in any object
configuration file.
Creating Service Definitions
For each service you want to monitor, you need to define a service in Nagios that is associated with the
host definition you just created. You can place service definitions in any object configuration file
specified by a cfg_file directive or placed in a directory specified by a cfg_dir directive.
Some example service definitions for monitoring common public service (HTTP, FTP, etc.) are given
below.
Monitoring HTTP
Chances are you’re going to want to monitor web servers at some point - either yours or someone else’s.
The check_http plugin is designed to do just that. It understands the HTTP protocol and can monitor
response time, error codes, strings in the returned HTML, server certificates, and much more.
The commands.cfg file contains a command definition for using the check_http plugin. It looks like this:
define command{
name check_http
command_name check_http
command_line $USER1$/check_http -I $HOSTADDRESS$ $ARG1$
}
39
A simple service definition for monitoring the HTTP service on the remotehost machine might look like
this:
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description HTTP
check_command check_http
}
This simple service definition will monitor the HTTP service running on remotehost. It will produce alerts
if the web server doesn’t respond within 10 seconds or if it returns HTTP errors codes (403, 404, etc.).
That’s all you need for basic monitoring. Pretty simple, huh?
Tip: For more advanced monitoring, run the check_http plugin manually with --help as a
command-line argument to see all the options you can give the plugin. This --help syntax works with all
of the plugins I’ll cover in this document.
A more advanced definition for monitoring the HTTP service is shown below. This service definition
will check to see if the /download/index.php URI contains the string "latest-version.tar.gz". It will
produce an error if the string isn’t found, the URI isn’t valid, or the web server takes longer than 5
seconds to respond.
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description Product Download Link
check_command check_http!-u /download/index.php -t 5 -s "latest-version.tar.gz"
}
Monitoring FTP
When you need to monitor FTP servers, you can use the check_ftp plugin. The commands.cfg file contains
a command definition for using the check_ftp plugin, which looks like this:
define command{
command_name check_ftp
command_line $USER1$/check_ftp -H $HOSTADDRESS$ $ARG1$
}
A simple service definition for monitoring the FTP server on remotehost would look like this:
40
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description FTP
check_command check_ftp
}
This service definition will monitor the FTP service and generate alerts if the FTP server doesn’t respond
within 10 seconds.
A more advanced service definition is shown below. This service will check the FTP server running on
port 1023 on remotehost. It will generate an alert if the server doesn’t respond within 5 seconds or if the
server response doesn’t contain the string "Pure-FTPd [TLS]".
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description Special FTP
check_command check_ftp!-p 1023 -t 5 -e "Pure-FTPd [TLS]"
}
Monitoring SSH
When you need to monitor SSH servers, you can use the check_ssh plugin. The commands.cfg file contains
a command definition for using the check_ssh plugin, which looks like this:
define command{
command_name check_ssh
command_line $USER1$/check_ssh $ARG1$ $HOSTADDRESS$
}
A simple service definition for monitoring the SSH server on remotehost would look like this:
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description SSH
check_command check_ssh
}
This service definition will monitor the SSH service and generate alerts if the SSH server doesn’t respond
within 10 seconds.
41
A more advanced service definition is shown below. This service will check the SSH server and generate
an alert if the server doesn’t respond within 5 seconds or if the server version string string doesn’t match
"OpenSSH_4.2".
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description SSH Version Check
check_command check_ssh!-t 5 -r "OpenSSH_4.2"
}
Monitoring SMTP
The check_smtp plugin can be using for monitoring your email servers. The commands.cfg file contains a
command definition for using the check_smtp plugin, which looks like this:
define command{
command_name check_smtp
command_line $USER1$/check_smtp -H $HOSTADDRESS$ $ARG1$
}
A simple service definition for monitoring the SMTP server on remotehost would look like this:
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description SMTP
check_command check_smtp
}
This service definition will monitor the SMTP service and generate alerts if the SMTP server doesn’t
respond within 10 seconds.
A more advanced service definition is shown below. This service will check the SMTP server and
generate an alert if the server doesn’t respond within 5 seconds or if the response from the server doesn’t
contain "mygreatmailserver.com".
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description SMTP Response Check
check_command check_smtp!-t 5 -e "mygreatmailserver.com"
}
42
Monitoring POP3
The check_pop plugin can be using for monitoring the POP3 service on your email servers. The
commands.cfg file contains a command definition for using the check_pop plugin, which looks like this:
define command{
command_name check_pop
command_line $USER1$/check_pop -H $HOSTADDRESS$ $ARG1$
}
A simple service definition for monitoring the POP3 service on remotehost would look like this:
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description POP3
check_command check_pop
}
This service definition will monitor the POP3 service and generate alerts if the POP3 server doesn’t
respond within 10 seconds.
A more advanced service definition is shown below. This service will check the POP3 service and
generate an alert if the server doesn’t respond within 5 seconds or if the response from the server doesn’t
contain "mygreatmailserver.com".
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description POP3 Response Check
check_command check_pop!-t 5 -e "mygreatmailserver.com"
}
Monitoring IMAP
The check_imap plugin can be using for monitoring IMAP4 service on your email servers. The
commands.cfg file contains a command definition for using the check_imap plugin, which looks like this:
define command{
command_name check_imap
command_line $USER1$/check_imap -H $HOSTADDRESS$ $ARG1$
}
A simple service definition for monitoring the IMAP4 service on remotehost would look like this:
43
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description IMAP
check_command check_imap
}
This service definition will monitor the IMAP4 service and generate alerts if the IMAP server doesn’t
respond within 10 seconds.
A more advanced service definition is shown below. This service will check the IMAP4 service and
generate an alert if the server doesn’t respond within 5 seconds or if the response from the server doesn’t
contain "mygreatmailserver.com".
define service{
use generic-service ; Inherit default values from a template
host_name remotehost
service_description IMAP4 Response Check
check_command check_imap!-t 5 -e "mygreatmailserver.com"
}
Restarting Nagios
Once you’ve added the new host and service definitions to your object configuration file(s), you’re ready
to start monitoring them. To do this, you’ll need to verify your configuration and restart Nagios.
If the verification process produces any errors messages, fix your configuration file before continuing.
Make sure that you don’t (re)start Nagios until the verification process completes without any errors!
44
Configuration Overview
Up To: Contents
See Also: Main Configuration File, Object Configuration Overview, CGI Configuration File
Introduction
There are several different configuration files that you’re going to need to create or edit before you start
monitoring anything. Be patient! Configuring Nagios can take quite a while, especially if you’re
first-time user. Once you figure out how things work, it’ll all be well worth your time. :-)
Note: Sample configuration files are installed in the /usr/local/nagios/etc/ directory when you follow
the quickstart installation guide.
Main Configuration File
The main configuration file contains a number of directives that affect how the Nagios daemon operates.
This config file is read by both the Nagios daemon and the CGIs. This is where you’re going to want to
get started in your configuration adventures.
Documentation for the main configuration file can be found here.
45
Resource File(s)
Resource files can be used to store user-defined macros. The main point of having resource files is to use
them to store sensitive configuration information (like passwords), without making them available to the
CGIs.
You can specify one or more optional resource files by using the resource_file directive in your main
configuration file.
Object Definition Files
Object definition files are used to define hosts, services, hostgroups, contacts, contactgroups, commands,
etc. This is where you define all the things you want monitor and how you want to monitor them.
You can specify one or more object definition files by using the cfg_file and/or cfg_dir directives in your
main configuration file.
An introduction to object definitions, and how they relate to each other, can be found here.
CGI Configuration File
The CGI configuration file contains a number of directives that affect the operation of the CGIs. It also
contains a reference the main configuration file, so the CGIs know how you’ve configured Nagios and
where your object defintions are stored.
Documentation for the CGI configuration file can be found here.
46
Main Configuration File Options
Up To: Contents
Notes
When creating and/or editing configuration files, keep the following in mind:
1. Lines that start with a ’#’ character are taken to be comments and are not processed
2. Variables names must begin at the start of the line - no white space is allowed before the name
3. Variable names are case-sensitive
Sample Configuration File
Tip: A sample main configuration file (/usr/local/nagios/etc/nagios.cfg) is installed for you when you
follow the quickstart installation guide.
Config File Location
The main configuration file is usually named nagios.cfg and located in the /usr/local/nagios/etc/ directory.
Configuration File Variables
Below you will find descriptions of each main Nagios configuration file option...
Log File
Format: log_file=<file_name>
Example: log_file=/usr/local/nagios/var/nagios.log
This variable specifies where Nagios should create its main log file. This should be the first variable that
you define in your configuration file, as Nagios will try to write errors that it finds in the rest of your
configuration data to this file. If you have log rotation enabled, this file will automatically be rotated
every hour, day, week, or month.
Object Configuration File
Format: cfg_file=<file_name>
Example:
cfg_file=/usr/local/nagios/etc/hosts.cfg
cfg_file=/usr/local/nagios/etc/services.cfg
cfg_file=/usr/local/nagios/etc/commands.cfg
47
This directive is used to specify an object configuration file containing object definitions that Nagios
should use for monitoring. Object configuration files contain definitions for hosts, host groups, contacts,
contact groups, services, commands, etc. You can seperate your configuration information into several
files and specify multiple cfg_file= statements to have each of them processed.
Object Configuration Directory
Format: cfg_dir=<directory_name>
Example:
cfg_dir=/usr/local/nagios/etc/commands
cfg_dir=/usr/local/nagios/etc/services
cfg_dir=/usr/local/nagios/etc/hosts
This directive is used to specify a directory which contains object configuration files that Nagios should
use for monitoring. All files in the directory with a .cfg extension are processed as object config files.
Additionally, Nagios will recursively process all config files in subdirectories of the directory you
specify here. You can seperate your configuration files into different directories and specify multiple
cfg_dir= statements to have all config files in each directory processed.
Object Cache File
Format: object_cache_file=<file_name>
Example: object_cache_file=/usr/local/nagios/var/objects.cache
This directive is used to specify a file in which a cached copy of object definitions should be stored. The
cache file is (re)created every time Nagios is (re)started and is used by the CGIs. It is intended to speed
up config file caching in the CGIs and allow you to edit the source object config files while Nagios is
running without affecting the output displayed in the CGIs.
Precached Object File
Format: precached_object_file=<file_name>
Example: precached_object_file=/usr/local/nagios/var/objects.precache
This directive is used to specify a file in which a pre-processed, pre-cached copy of object definitions
should be stored. This file can be used to drastically improve startup times in large/complex Nagios
installations. Read more information on how to speed up start times here.
Resource File
Format: resource_file=<file_name>
Example: resource_file=/usr/local/nagios/etc/resource.cfg
This is used to specify an optional resource file that can contain $USERn$ macro definitions. $USERn$
macros are useful for storing usernames, passwords, and items commonly used in command definitions
(like directory paths). The CGIs will not attempt to read resource files, so you can set restrictive
permissions (600 or 660) on them to protect sensitive information. You can include multiple resource
48
files by adding multiple resource_file statements to the main config file - Nagios will process them all.
See the sample resource.cfg file in the sample-config/ subdirectory of the Nagios distribution for an
example of how to define $USERn$ macros.
Temp File
Format: temp_file=<file_name>
Example: temp_file=/usr/local/nagios/var/nagios.tmp
This is a temporary file that Nagios periodically creates to use when updating comment data, status
data, etc. The file is deleted when it is no longer needed.
Temp Path
Format: temp_path=<dir_name>
Example: temp_path=/tmp
This is a directory that Nagios can use as scratch space for creating temporary files used during the
monitoring process. You should run tmpwatch, or a similiar utility, on this directory occassionally to
delete files older than 24 hours.
Status File
Format: status_file=<file_name>
Example: status_file=/usr/local/nagios/var/status.dat
This is the file that Nagios uses to store the current status, comment, and downtime information. This
file is used by the CGIs so that current monitoring status can be reported via a web interface. The CGIs
must have read access to this file in order to function properly. This file is deleted every time Nagios
stops and recreated when it starts.
Status File Update Interval
Format: status_update_interval=<seconds>
Example: status_update_interval=15
This setting determines how often (in seconds) that Nagios will update status data in the status file. The
minimum update interval is 1 second.
Nagios User
Format: nagios_user=<username/UID>
Example: nagios_user=nagios
49
This is used to set the effective user that the Nagios process should run as. After initial program startup
and before starting to monitor anything, Nagios will drop its effective privileges and run as this user.
You may specify either a username or a UID.
Nagios Group
Format: nagios_group=<groupname/GID>
Example: nagios_group=nagios
This is used to set the effective group that the Nagios process should run as. After initial program
startup and before starting to monitor anything, Nagios will drop its effective privileges and run as this
group. You may specify either a groupname or a GID.
Notifications Option
Format: enable_notifications=<0/1>
Example: enable_notifications=1
This option determines whether or not Nagios will send out notifications when it initially (re)starts. If
this option is disabled, Nagios will not send out notifications for any host or service. Note: If you have
state retention enabled, Nagios will ignore this setting when it (re)starts and use the last known setting
for this option (as stored in the state retention file), unless you disable the use_retained_program_state
option. If you want to change this option when state retention is active (and the
use_retained_program_state is enabled), you’ll have to use the appropriate external command or change
it via the web interface. Values are as follows:
0 = Disable notifications
1 = Enable notifications (default)
Service Check Execution Option
Format: execute_service_checks=<0/1>
Example: execute_service_checks=1
This option determines whether or not Nagios will execute service checks when it initially (re)starts. If
this option is disabled, Nagios will not actively execute any service checks and will remain in a sort of
"sleep" mode (it can still accept passive checks unless you’ve disabled them). This option is most often
used when configuring backup monitoring servers, as described in the documentation on redundancy,
or when setting up a distributed monitoring environment. Note: If you have state retention enabled,
Nagios will ignore this setting when it (re)starts and use the last known setting for this option (as stored
in the state retention file), unless you disable the use_retained_program_state option. If you want to
change this option when state retention is active (and the use_retained_program_state is enabled), you’ll
have to use the appropriate external command or change it via the web interface. Values are as follows:
0 = Don’t execute service checks
1 = Execute service checks (default)
50
Passive Service Check Acceptance Option
Format: accept_passive_service_checks=<0/1>
Example: accept_passive_service_checks=1
This option determines whether or not Nagios will accept passive service checks when it initially
(re)starts. If this option is disabled, Nagios will not accept any passive service checks. Note: If you have
state retention enabled, Nagios will ignore this setting when it (re)starts and use the last known setting
for this option (as stored in the state retention file), unless you disable the use_retained_program_state
option. If you want to change this option when state retention is active (and the
use_retained_program_state is enabled), you’ll have to use the appropriate external command or change
it via the web interface. Values are as follows:
0 = Don’t accept passive service checks
1 = Accept passive service checks (default)
Host Check Execution Option
Format: execute_host_checks=<0/1>
Example: execute_host_checks=1
This option determines whether or not Nagios will execute on-demand and regularly scheduled host
checks when it initially (re)starts. If this option is disabled, Nagios will not actively execute any host
checks, although it can still accept passive host checks unless you’ve disabled them). This option is most
often used when configuring backup monitoring servers, as described in the documentation on
redundancy, or when setting up a distributed monitoring environment. Note: If you have state retention
enabled, Nagios will ignore this setting when it (re)starts and use the last known setting for this option
(as stored in the state retention file), unless you disable the use_retained_program_state option. If you
want to change this option when state retention is active (and the use_retained_program_state is
enabled), you’ll have to use the appropriate external command or change it via the web interface. Values
are as follows:
0 = Don’t execute host checks
1 = Execute host checks (default)
Passive Host Check Acceptance Option
Format: accept_passive_host_checks=<0/1>
Example: accept_passive_host_checks=1
This option determines whether or not Nagios will accept passive host checks when it initially (re)starts.
If this option is disabled, Nagios will not accept any passive host checks. Note: If you have state
retention enabled, Nagios will ignore this setting when it (re)starts and use the last known setting for
this option (as stored in the state retention file), unless you disable the use_retained_program_state
option. If you want to change this option when state retention is active (and the
use_retained_program_state is enabled), you’ll have to use the appropriate external command or change
it via the web interface. Values are as follows:
51
0 = Don’t accept passive host checks
1 = Accept passive host checks (default)
Event Handler Option
Format: enable_event_handlers=<0/1>
Example: enable_event_handlers=1
This option determines whether or not Nagios will run event handlers when it initially (re)starts. If this
option is disabled, Nagios will not run any host or service event handlers. Note: If you have state
retention enabled, Nagios will ignore this setting when it (re)starts and use the last known setting for
this option (as stored in the state retention file), unless you disable the use_retained_program_state
option. If you want to change this option when state retention is active (and the
use_retained_program_state is enabled), you’ll have to use the appropriate external command or change
it via the web interface. Values are as follows:
0 = Disable event handlers
1 = Enable event handlers (default)
Log Rotation Method
Format: log_rotation_method=<n/h/d/w/m>
Example: log_rotation_method=d
This is the rotation method that you would like Nagios to use for your log file. Values are as follows:
n = None (don’t rotate the log - this is the default)
h = Hourly (rotate the log at the top of each hour)
d = Daily (rotate the log at midnight each day)
w = Weekly (rotate the log at midnight on Saturday)
m = Monthly (rotate the log at midnight on the last day of the month)
Log Archive Path
Format: log_archive_path=<path>
Example: log_archive_path=/usr/local/nagios/var/archives/
This is the directory where Nagios should place log files that have been rotated. This option is ignored if
you choose to not use the log rotation functionality.
External Command Check Option
Format: check_external_commands=<0/1>
Example: check_external_commands=1
52
This option determines whether or not Nagios will check the command file for commands that should
be executed. This option must be enabled if you plan on using the command CGI to issue commands via
the web interface. More information on external commands can be found here.
0 = Don’t check external commands
1 = Check external commands (default)
External Command Check Interval
Format: command_check_interval=<xxx>[s]
Example: command_check_interval=1
If you specify a number with an "s" appended to it (i.e. 30s), this is the number of seconds to wait between
external command checks. If you leave off the "s", this is the number of "time units" to wait between
external command checks. Unless you’ve changed the interval_length value (as defined below) from the
default value of 60, this number will mean minutes.
Note: By setting this value to -1, Nagios will check for external commands as often as possible. Each time
Nagios checks for external commands it will read and process all commands present in the command
file before continuing on with its other duties. More information on external commands can be found
here.
External Command File
Format: command_file=<file_name>
Example: command_file=/usr/local/nagios/var/rw/nagios.cmd
This is the file that Nagios will check for external commands to process. The command CGI writes
commands to this file. The external command file is implemented as a named pipe (FIFO), which is
created when Nagios starts and removed when it shuts down. If the file exists when Nagios starts, the
Nagios process will terminate with an error message. More information on external commands can be
found here.
External Command Buffer Slots
Format: external_command_buffer_slots=<#>
Example: external_command_buffer_slots=512
Note: This is an advanced feature. This option determines how many buffer slots Nagios will reserve for
caching external commands that have been read from the external command file by a worker thread, but
have not yet been processed by the main thread of the Nagios deamon. Each slot can hold one external
command, so this option essentially determines how many commands can be buffered. For installations
where you process a large number of passive checks (e.g. distributed setups), you may need to increase
this number. You should consider using MRTG to graph Nagios’ usage of external command buffers.
You can read more on how to configure graphing here.
Update Checks
53
Format: check_for_updates=<0/1>
Example: check_for_updates=1
This option determines whether Nagios will automatically check to see if new updates (releases) are
available. It is recommend that you enable this option to ensure that you stay on top of the latest critical
patches to Nagios. Nagios is critical to you - make sure you keep it in good shape. Nagios will check
once a day for new updates. Data collected by Nagios Enterprises from the update check is processed in
accordance with our privacy policy - see http://api.nagios.org for details.
Bare Update Checks
Format: bare_update_checks=<0/1>
Example: bare_update_checks
This option deterines what data Nagios will send to api.nagios.org when it checks for updates. By
default, Nagios will send information on the current version of Nagios you have installed, as well as an
indicator as to whether this was a new installation or not. Nagios Enterprises uses this data to determine
the number of users running specific version of Nagios. Enable this option if you do not wish for this
information to be sent.
Lock File
Format: lock_file=<file_name>
Example: lock_file=/tmp/nagios.lock
This option specifies the location of the lock file that Nagios should create when it runs as a daemon
(when started with the -d command line argument). This file contains the process id (PID) number of the
running Nagios process.
State Retention Option
Format: retain_state_information=<0/1>
Example: retain_state_information=1
This option determines whether or not Nagios will retain state information for hosts and services
between program restarts. If you enable this option, you should supply a value for the
state_retention_file variable. When enabled, Nagios will save all state information for hosts and service
before it shuts down (or restarts) and will read in previously saved state information when it starts up
again.
0 = Don’t retain state information
1 = Retain state information (default)
State Retention File
54
Format: state_retention_file=<file_name>
Example: state_retention_file=/usr/local/nagios/var/retention.dat
This is the file that Nagios will use for storing status, downtime, and comment information before it
shuts down. When Nagios is restarted it will use the information stored in this file for setting the initial
states of services and hosts before it starts monitoring anything. In order to make Nagios retain state
information between program restarts, you must enable the retain_state_information option.
Automatic State Retention Update Interval
Format: retention_update_interval=<minutes>
Example: retention_update_interval=60
This setting determines how often (in minutes) that Nagios will automatically save retention data during
normal operation. If you set this value to 0, Nagios will not save retention data at regular intervals, but it
will still save retention data before shutting down or restarting. If you have disabled state retention
(with the retain_state_information option), this option has no effect.
Use Retained Program State Option
Format: use_retained_program_state=<0/1>
Example: use_retained_program_state=1
This setting determines whether or not Nagios will set various program-wide state variables based on
the values saved in the retention file. Some of these program-wide state variables that are normally
saved across program restarts if state retention is enabled include the enable_notifications,
enable_flap_detection, enable_event_handlers, execute_service_checks, and
accept_passive_service_checks options. If you do not have state retention enabled, this option has no
effect.
0 = Don’t use retained program state
1 = Use retained program state (default)
Use Retained Scheduling Info Option
Format: use_retained_scheduling_info=<0/1>
Example: use_retained_scheduling_info=1
This setting determines whether or not Nagios will retain scheduling info (next check times) for hosts
and services when it restarts. If you are adding a large number (or percentage) of hosts and services, I
would recommend disabling this option when you first restart Nagios, as it can adversely skew the
spread of initial checks. Otherwise you will probably want to leave it enabled.
0 = Don’t use retained scheduling info
1 = Use retained scheduling info (default)
55
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3
Nagios 3

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation Gosa Loaddays2010
Presentation Gosa Loaddays2010Presentation Gosa Loaddays2010
Presentation Gosa Loaddays2010loadays
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh clevernetsystemsgeneva
 
Jurijs Velikanovs - RAC Attack 101 - How to install 12c RAC on your laptop
Jurijs Velikanovs -  RAC Attack 101 - How to install 12c RAC on your laptop  Jurijs Velikanovs -  RAC Attack 101 - How to install 12c RAC on your laptop
Jurijs Velikanovs - RAC Attack 101 - How to install 12c RAC on your laptop Andrejs Vorobjovs
 
Distributed Monitoring and Cloud Scaling
Distributed Monitoring and Cloud ScalingDistributed Monitoring and Cloud Scaling
Distributed Monitoring and Cloud ScalingFernando Honig
 
图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库
图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库
图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库maclean liu
 
Upgrade ipa to rhel 7
Upgrade ipa to rhel 7Upgrade ipa to rhel 7
Upgrade ipa to rhel 7Amjad Yaseen
 
Securing Hadoop with OSSEC
Securing Hadoop with OSSECSecuring Hadoop with OSSEC
Securing Hadoop with OSSECVic Hargrave
 
HNazarianRes_Current_19Feb2015
HNazarianRes_Current_19Feb2015HNazarianRes_Current_19Feb2015
HNazarianRes_Current_19Feb2015Harry Nazarian
 
Jurijs Velikanovs Direct NFS - Why and How?
Jurijs Velikanovs Direct NFS - Why and How?Jurijs Velikanovs Direct NFS - Why and How?
Jurijs Velikanovs Direct NFS - Why and How?Andrejs Vorobjovs
 
Vbox virtual box在oracle linux 5 - shoug 梁洪响
Vbox virtual box在oracle linux 5 - shoug 梁洪响Vbox virtual box在oracle linux 5 - shoug 梁洪响
Vbox virtual box在oracle linux 5 - shoug 梁洪响maclean liu
 
Micro Datacenter & Data Warehouse
Micro Datacenter & Data WarehouseMicro Datacenter & Data Warehouse
Micro Datacenter & Data Warehousemdcdwh
 
Oracle Unified Directory. Lessons learnt. Is it ready for a move from OID? (O...
Oracle Unified Directory. Lessons learnt. Is it ready for a move from OID? (O...Oracle Unified Directory. Lessons learnt. Is it ready for a move from OID? (O...
Oracle Unified Directory. Lessons learnt. Is it ready for a move from OID? (O...Andrejs Prokopjevs
 
Deployment guide c07_554713
Deployment guide c07_554713Deployment guide c07_554713
Deployment guide c07_554713John Yu
 
SSL: limitations, bad practices and how to do it right
SSL: limitations, bad practices  and how to do it rightSSL: limitations, bad practices  and how to do it right
SSL: limitations, bad practices and how to do it rightTiago Mendo
 

Was ist angesagt? (17)

Presentation Gosa Loaddays2010
Presentation Gosa Loaddays2010Presentation Gosa Loaddays2010
Presentation Gosa Loaddays2010
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
 
Jurijs Velikanovs - RAC Attack 101 - How to install 12c RAC on your laptop
Jurijs Velikanovs -  RAC Attack 101 - How to install 12c RAC on your laptop  Jurijs Velikanovs -  RAC Attack 101 - How to install 12c RAC on your laptop
Jurijs Velikanovs - RAC Attack 101 - How to install 12c RAC on your laptop
 
Distributed Monitoring and Cloud Scaling
Distributed Monitoring and Cloud ScalingDistributed Monitoring and Cloud Scaling
Distributed Monitoring and Cloud Scaling
 
Alfresco Certificates
Alfresco Certificates Alfresco Certificates
Alfresco Certificates
 
图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库
图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库
图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库
 
Upgrade ipa to rhel 7
Upgrade ipa to rhel 7Upgrade ipa to rhel 7
Upgrade ipa to rhel 7
 
Securing Hadoop with OSSEC
Securing Hadoop with OSSECSecuring Hadoop with OSSEC
Securing Hadoop with OSSEC
 
HNazarianRes_Current_19Feb2015
HNazarianRes_Current_19Feb2015HNazarianRes_Current_19Feb2015
HNazarianRes_Current_19Feb2015
 
Jurijs Velikanovs Direct NFS - Why and How?
Jurijs Velikanovs Direct NFS - Why and How?Jurijs Velikanovs Direct NFS - Why and How?
Jurijs Velikanovs Direct NFS - Why and How?
 
Vbox virtual box在oracle linux 5 - shoug 梁洪响
Vbox virtual box在oracle linux 5 - shoug 梁洪响Vbox virtual box在oracle linux 5 - shoug 梁洪响
Vbox virtual box在oracle linux 5 - shoug 梁洪响
 
Proxy SQL 2.0 with PXC
Proxy SQL 2.0 with PXCProxy SQL 2.0 with PXC
Proxy SQL 2.0 with PXC
 
Micro Datacenter & Data Warehouse
Micro Datacenter & Data WarehouseMicro Datacenter & Data Warehouse
Micro Datacenter & Data Warehouse
 
Oracle Unified Directory. Lessons learnt. Is it ready for a move from OID? (O...
Oracle Unified Directory. Lessons learnt. Is it ready for a move from OID? (O...Oracle Unified Directory. Lessons learnt. Is it ready for a move from OID? (O...
Oracle Unified Directory. Lessons learnt. Is it ready for a move from OID? (O...
 
Deployment guide c07_554713
Deployment guide c07_554713Deployment guide c07_554713
Deployment guide c07_554713
 
ION Djibouti: KENIC DNSSEC Case Study
ION Djibouti: KENIC DNSSEC Case StudyION Djibouti: KENIC DNSSEC Case Study
ION Djibouti: KENIC DNSSEC Case Study
 
SSL: limitations, bad practices and how to do it right
SSL: limitations, bad practices  and how to do it rightSSL: limitations, bad practices  and how to do it right
SSL: limitations, bad practices and how to do it right
 

Andere mochten auch

glideinWMS Frontend Monitoring - glideinWMS Training Jan 2012
glideinWMS Frontend Monitoring - glideinWMS Training Jan 2012glideinWMS Frontend Monitoring - glideinWMS Training Jan 2012
glideinWMS Frontend Monitoring - glideinWMS Training Jan 2012Igor Sfiligoi
 
Add-On Development: EE Expects that Every Developer will do his Duty
Add-On Development: EE Expects that Every Developer will do his DutyAdd-On Development: EE Expects that Every Developer will do his Duty
Add-On Development: EE Expects that Every Developer will do his Dutyreedmaniac
 
17) 11 (may, 2003) squid master this proxy server
17) 11 (may, 2003)   squid master this proxy server17) 11 (may, 2003)   squid master this proxy server
17) 11 (may, 2003) squid master this proxy serverswarup1435
 
Using Q4M - a message queue storage engine for MySQL
Using Q4M - a message queue storage engine for MySQLUsing Q4M - a message queue storage engine for MySQL
Using Q4M - a message queue storage engine for MySQLKazuho Oku
 

Andere mochten auch (6)

glideinWMS Frontend Monitoring - glideinWMS Training Jan 2012
glideinWMS Frontend Monitoring - glideinWMS Training Jan 2012glideinWMS Frontend Monitoring - glideinWMS Training Jan 2012
glideinWMS Frontend Monitoring - glideinWMS Training Jan 2012
 
Add-On Development: EE Expects that Every Developer will do his Duty
Add-On Development: EE Expects that Every Developer will do his DutyAdd-On Development: EE Expects that Every Developer will do his Duty
Add-On Development: EE Expects that Every Developer will do his Duty
 
Doctrine in FLOW3
Doctrine in FLOW3Doctrine in FLOW3
Doctrine in FLOW3
 
17) 11 (may, 2003) squid master this proxy server
17) 11 (may, 2003)   squid master this proxy server17) 11 (may, 2003)   squid master this proxy server
17) 11 (may, 2003) squid master this proxy server
 
This is from spr
This is from sprThis is from spr
This is from spr
 
Using Q4M - a message queue storage engine for MySQL
Using Q4M - a message queue storage engine for MySQLUsing Q4M - a message queue storage engine for MySQL
Using Q4M - a message queue storage engine for MySQL
 

Ähnlich wie Nagios 3

Nagios Conference 2013 - Sam Lansing - Getting Started With Nagios XI, Core, ...
Nagios Conference 2013 - Sam Lansing - Getting Started With Nagios XI, Core, ...Nagios Conference 2013 - Sam Lansing - Getting Started With Nagios XI, Core, ...
Nagios Conference 2013 - Sam Lansing - Getting Started With Nagios XI, Core, ...Nagios
 
How tos nagios - centos wiki
How tos nagios - centos wikiHow tos nagios - centos wiki
How tos nagios - centos wikishahab071
 
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]Krisman Tarigan
 
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios CoreNrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios CoreNagios
 
NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.
NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.
NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.Marc Trimble
 
Prometheus - Intro, CNCF, TSDB,PromQL,Grafana
Prometheus - Intro, CNCF, TSDB,PromQL,GrafanaPrometheus - Intro, CNCF, TSDB,PromQL,Grafana
Prometheus - Intro, CNCF, TSDB,PromQL,GrafanaSridhar Kumar N
 
Install nagios
Install nagiosInstall nagios
Install nagioshassandb
 
Install nagios
Install nagiosInstall nagios
Install nagioshassandb
 
Install nagios
Install nagiosInstall nagios
Install nagioshassandb
 
Ten steps for network documentation
Ten steps for network documentationTen steps for network documentation
Ten steps for network documentationLiberteks
 
Squid proxy-configuration-guide
Squid proxy-configuration-guideSquid proxy-configuration-guide
Squid proxy-configuration-guidejasembo
 
How to Use OWASP Security Logging
How to Use OWASP Security LoggingHow to Use OWASP Security Logging
How to Use OWASP Security LoggingMilton Smith
 
Deploy Application Files with Git
Deploy Application Files with GitDeploy Application Files with Git
Deploy Application Files with GitAlec Clews
 
Monitoring federation open stack infrastructure
Monitoring federation open stack infrastructureMonitoring federation open stack infrastructure
Monitoring federation open stack infrastructureFernando Lopez Aguilar
 
NGINX Installation and Tuning
NGINX Installation and TuningNGINX Installation and Tuning
NGINX Installation and TuningNGINX, Inc.
 

Ähnlich wie Nagios 3 (20)

Nagios 3
Nagios 3Nagios 3
Nagios 3
 
Nagios Conference 2013 - Sam Lansing - Getting Started With Nagios XI, Core, ...
Nagios Conference 2013 - Sam Lansing - Getting Started With Nagios XI, Core, ...Nagios Conference 2013 - Sam Lansing - Getting Started With Nagios XI, Core, ...
Nagios Conference 2013 - Sam Lansing - Getting Started With Nagios XI, Core, ...
 
How tos nagios - centos wiki
How tos nagios - centos wikiHow tos nagios - centos wiki
How tos nagios - centos wiki
 
Nagios En
Nagios EnNagios En
Nagios En
 
Nagios intro
Nagios intro Nagios intro
Nagios intro
 
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
 
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios CoreNrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core
 
NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.
NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.
NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.
 
Prometheus - Intro, CNCF, TSDB,PromQL,Grafana
Prometheus - Intro, CNCF, TSDB,PromQL,GrafanaPrometheus - Intro, CNCF, TSDB,PromQL,Grafana
Prometheus - Intro, CNCF, TSDB,PromQL,Grafana
 
Nagios
NagiosNagios
Nagios
 
Install nagios
Install nagiosInstall nagios
Install nagios
 
Install nagios
Install nagiosInstall nagios
Install nagios
 
Install nagios
Install nagiosInstall nagios
Install nagios
 
Ten steps for network documentation
Ten steps for network documentationTen steps for network documentation
Ten steps for network documentation
 
Squid proxy-configuration-guide
Squid proxy-configuration-guideSquid proxy-configuration-guide
Squid proxy-configuration-guide
 
How to Use OWASP Security Logging
How to Use OWASP Security LoggingHow to Use OWASP Security Logging
How to Use OWASP Security Logging
 
Graylog
GraylogGraylog
Graylog
 
Deploy Application Files with Git
Deploy Application Files with GitDeploy Application Files with Git
Deploy Application Files with Git
 
Monitoring federation open stack infrastructure
Monitoring federation open stack infrastructureMonitoring federation open stack infrastructure
Monitoring federation open stack infrastructure
 
NGINX Installation and Tuning
NGINX Installation and TuningNGINX Installation and Tuning
NGINX Installation and Tuning
 

Nagios 3

  • 1. Nagios Core Version 3.x Documentation http://www.nagios.org Copyright © 2009 Nagios Core Development Team and Community Contributors. Copyright © 1999-2009 Ethan Galstad. Portions copyright by Nagios Community members. See the THANKS file for more information. Last Updated: 06-16-2009 [ Table of Contents ] Nagios, Nagios Core, NRPE, NSCA, and the Nagios logo are trademarks, servicemarks, registered servicemarks or registered trademarks of Nagios Enterprises. All other trademarks, servicemarks, registered trademarks, and registered servicemarks mentioned herein may be the property of their respective owner(s). The information contained herein is provided AS IS with NO WARRANTY OF ANY KIND, INCLUDING THE WARRANTY OF DESIGN, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. 1
  • 2. Nagios Core 3.x Documentation Table of Contents About What is Nagios? System requirements Licensing Downloading the latest version Release Notes What’s new in this version Known issues Support Nagios Support Portal Nagios Community Wiki Getting Started Advice for beginners Quickstart installation guide Upgrading from previous versions How to monitor a Windows machine How to monitor a Linux/Unix machine How to monitor a Netware server How to monitor a network printer How to monitor a router/switch How to monitor a publicly available service (HTTP, FTP, SSH, etc.) Configuring Nagios Configuration overview Main configuration file options Object configuration overview Object definitions CGI configuration file options Configuring authorization for the CGIs Running Nagios Verifying your configuration Starting and stopping Nagios The Basics Plugins Macros and how they work Standard macros available in Nagios Host checks Service checks Active checks Passive checks State types Time periods Determining status and reachability of network hosts Notifications 2
  • 3. Information on the CGIs Advanced Topics External commands Event handlers Volatile services Service and host result freshness checks Distributed monitoring Redundant and failover monitoring Detection and handling of state flapping Notification escalations On-call notification rotations Monitoring service and host clusters Host and service dependencies State stalking Performance data Scheduled host and service downtime Using the embedded Perl interpreter Adaptive monitoring Predictive dependency checks Cached checks Passive host state translation Check scheduling Custom CGI headers and footers Object inheritance Time-saving tips for object definitions Security and Performance Tuning Security considerations Enhanced CGI security and authentication Tuning Nagios for maximum performance Fast startup options Large installation tweaks Using the nagiostats utility Graphing Nagios performance statistics Integration With Other Software Integration Overview SNMP Traps TCP Wrappers Nagios Addons NRPE NSCA NDOUtils Other addons Nagios Exchange Development Plugin API Developing Plugins For Use With Embedded Perl 3
  • 4. About Nagios Up To: Contents See Also: Quickstart Installation Guides Nagios Overview More information about Nagios - including features, case studies, and technical specifications can be found online at www.nagios.org/about/. What Is Nagios? Nagios® is a system and network monitoring application. It watches hosts and services that you specify, alerting you when things go bad and when they get better. Nagios was originally designed to run under Linux, although it should work under most other unices as well. Some of the many features of Nagios include: Monitoring of network services (SMTP, POP3, HTTP, NNTP, PING, etc.) Monitoring of host resources (processor load, disk usage, etc.) Simple plugin design that allows users to easily develop their own service checks Parallelized service checks Ability to define network host hierarchy using "parent" hosts, allowing detection of and distinction between hosts that are down and those that are unreachable Contact notifications when service or host problems occur and get resolved (via email, pager, or user-defined method) Ability to define event handlers to be run during service or host events for proactive problem resolution Automatic log file rotation Support for implementing redundant monitoring hosts Optional web interface for viewing current network status, notification and problem history, log file, etc. System Requirements The only requirement of running Nagios is a machine running Linux (or UNIX variant) and a C compiler. You will probably also want to have TCP/IP configured, as most service checks will be performed over the network. You are not required to use the CGIs included with Nagios. However, if you do decide to use them, you will need to have the following software installed... 1. A web server (preferrably Apache) 2. Thomas Boutell’s gd library version 1.6.3 or higher (required by the statusmap and trends CGIs) 4
  • 5. Licensing Nagios is licensed under the terms of the GNU General Public License Version 2 as published by the Free Software Foundation. This gives you legal permission to copy, distribute and/or modify Nagios under certain conditions. Read the ’LICENSE’ file in the Nagios distribution or read the online version of the license for more details. Nagios is provided AS IS with NO WARRANTY OF ANY KIND, INCLUDING THE WARRANTY OF DESIGN, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. Acknowledgements Several people have contributed to Nagios by either reporting bugs, suggesting improvements, writing plugins, etc. A list of some of the many contributors to the development of Nagios can be found in the THANKS file in the root of the Nagios distribution. Downloading The Latest Version You can check for new versions of Nagios at http://www.nagios.org. Nagios and the Nagios logo are trademarks of Nagios Enterprises, LLC. All other trademarks, servicemarks, registered trademarks, and registered servicemarks may be the property of their respective owner(s). 5
  • 6. What’s New in Nagios Core 3.x Up To: Contents See Also: Known Issues Important: Make sure you read through the documentation and the FAQs at support.nagios.com before sending a question to the mailing lists. Change Log The change log for Nagios can be found online at http://www.nagios.org/development/history or in the Changelog file in the root directory of the source code distribution. Changes and New Features 1. Documentation: Doc updates - I’m slowly making my way through rewriting most all portions of the documentation. This is going to take a while, as (1) there’s a lot of documentation and (2) writing documentation is not my favorite thing in the world. Expect some portions of the docs to be different than others for a while. I hope the changes I’m making will make things clearer/easier for new and seasoned Nagios users alike. 2. Macros: New macros - New macros have been added, including: $TEMPPATH$, $LONGHOSTOUTPUT$, $LONGSERVICEOUTPUT$, $HOSTNOTIFICATIONID$, $SERVICENOTIFICATIONID$, $HOSTEVENTID$, $SERVICEEVENTID$, $SERVICEISVOLATILE$, $LASTHOSTEVENTID$, $LASTSERVICEEVENTID$, $HOSTDISPLAYNAME$, $SERVICEDISPLAYNAME$, $MAXHOSTATTEMPTS$, $MAXSERVICEATTEMPTS$, $TOTALHOSTSERVICES$, $TOTALHOSTSERVICESOK$, $TOTALHOSTSERVICESWARNING$, $TOTALHOSTSERVICESUNKNOWN$, $TOTALHOSTSERVICESCRITICAL$, $CONTACTGROUPNAME$, $CONTACTGROUPNAMES$, $CONTACTGROUPALIAS$, $CONTACTGROUPMEMBERS$, $NOTIFICATIONRECIPIENTS$, $NOTIFICATIONISESCALATED$, $NOTIFICATIONAUTHOR$, $NOTIFICATIONAUTHORNAME$, $NOTIFICATIONAUTHORALIAS$, $NOTIFICATIONCOMMENT$, $EVENTSTARTTIME$, $HOSTPROBLEMID$, $LASTHOSTPROBLEMID$, $SERVICEPROBLEMID$, $LASTSERVICEPROBLEMID$, $LASTHOSSTATE$, $LASTHOSTSTATEID$, $LASTSERVICESTATE$, $LASTSERVICESTATEID$. Two special on-demand time macros have also been added: $ISVALIDTIME:$ and $NEXTVALIDTIME:$. Removed macros - The old $NOTIFICATIONNUMBER$ macro has been deprecated in favor of new $HOSTNOTIFICATIONNUMBER$ and $SERVICENOTIFICATIONNUMBER$ macros. Changes - The $HOSTNOTES$ and $SERVICENOTES$ macros may now contain macros themselves, just like the $HOSTNOTESURL$, $HOSTACTIONURL$, $SERVICENOTESURL$ and $SERVICEACTIONURL$ macros. Macros are normally available as environment variables when check, event handler, notification, and other commands are run. This can be rather CPU intensive in large Nagios installations, so you can disable this behavior with the enable_environment_macros option. Macro information can be found here. 6
  • 7. 3. Scheduled Downtime: Scheduled downtime entries are no longer stored in their own file (previously specified with a downtime_file directive in the main configuration file). Current and retained scheduled downtime entries are now stored in the status file and retention file, respectively. 4. Comments: Host and service comments are no longer stored in their own file (previously specified with a comment_file directive in the main configuration file). Current and retained comments are now stored in the status file and retention file, respectively. Acknowledgement comments that are marked as non-persistent are now only deleted when the acknowledgement is removed. They were previously automatically deleted when Nagios restarted, which was not ideal. 5. State Retention Data: Status information for individual contacts is now retained across program restarts. Comment and downtime IDs are now retained across program restarts and should be unique unless the retention data is deleted or ignored. Added retained_host_attribute_mask and retained_service_attribute_mask variables to control what host/service attributes are retained globally across program restarts. Added retained_process_host_attribute_mask and retained_process_service_attribute_mask variables to control what process attributes are retained across program restarts. Added retained_contact_host_attribute_mask and retained_contact_service_attribute_mask variables to control what contact attributes are retained globally across program restarts. 6. Flap Detection: Added flap_detection_options directive to host and service definitions to allow you to specify what host/service states should be used by the flap detection logic (by default all states are used). Percent state change and state history are now retained and recorded even when flap detection is disabled. Hosts and services are immediately checked for flapping when flap detection is enabled program-wide. Hosts and services that are flapping when flap detection is disabled program-wide are now logged. More information on flap detection can be found here. 7. External Commands: Added a new PROCESS_FILE external command to allow processing of external commands found in an external (regular) file. Useful for processing large amounts of passive checks with long output, or for scripting regular commands. More information can be found here. Custom commands may now be submitted to Nagios. Custom command names are prefixed with an underscore and are not processed internally by the Nagios daemon. They may, however, be processed by a loaded NEB module. The check_external_commands option is now enabled by default, which means Nagios is configured to check for external "commands out of the box". All 2.x and earlier versions of Nagios had this option disabled by default. 8. Status Data: Contact status information (last notification times, notifications enabled/disabled, etc.) is now saved in the status and retention files, although it is not processed by the CGIs. 9. Embedded Perl: Added new enable_embedded_perl and use_embedded_perl_implicitly variables to control use of the embedded Perl interpreter. Perl scripts/plugins can now explicitly tell Nagios whether or not they should be run under the embedded Pel interpreter. This is useful if you have troublesome scripts that don’t function well under the ePN. More information about these new options can be found here. 7
  • 8. 10. Adaptive Monitoring: The check timeperiod for hosts and services can now be modified on-the-fly with the appropriate external command (CHANGE_HOST_CHECK_TIMEPERIOD or CHANGE_SVC_CHECK_TIMEPERIOD). Look here for available adaptive monitoring commands. 11. Notifications: A first_notification_delay option has been added to host and service definitions to (what else) introduce a delay between when a host/service problem first occurs and when the first problem notification goes out. In previous versions you had to use some mighty config-fu with escalations to accomplish this. Now this feature is available to normal mortals. Notifications are now sent out for hosts/services that are flapping when flap detection is disabled on a host- or service-specific basis or on a program-wide basis. The $NOTIFICATIONTYPE$ macro will be set to "FLAPPINGDISABLED" in this situation. Notifications can now be sent out when scheduled downtime start, ends, and is cancelled for hosts and services. The $NOTIFICATIONTYPE$ macro will be set to "DOWNTIMESTART", "DOWNTIMEEND", or "DOWNTIMECANCELLED", respectively. In order to receive notifications on scheduled downtime events, specify "s" or "downtime" in your contact, host, and/or service notification options. More information on notifications can be found here. 12. Object Definitions: Service dependencies can now be created to easily define "same host" dependencies for different services on one or more hosts. (Read more) Extended host and service definitions (hostextinfo and serviceextinfo, respectively) have been deprecated. All values that from extended definitions have been merged with host or service definitions, as appropriate. Nagios 3 will continue to read and process older extended information definitions, but will log a warning. Future versions of Nagios (4.x and later) will not support separate extended info definitions. New hostgroup_members, servicegroup_members, and contactgroup_members directives have been added to hostgroup, servicegroup, and contactgroups definitions, respectively. This allows you to include hosts, services, or contacts from sub-groups in your group definitions. New notes, notes_url, and action_url have been added to hostgroup and servicegroup definition. Contact definitions have the new host_notifications_enabled, service_notifications_enabled, and can_submit_commands directives to better control notifications and determine whether or not they can submit commands through the web interface. Host and service dependencies now support an optional dependency_period directive. This allows you to limit the times during which dependencies are valid. The parallelize directive in service definitions is now deprecated and no longer used. All service checks are run in parallel in Nagios 3. There are no longer any inherent limitations on the length of host names or service descriptions. Extended regular expressions are now used if you enable the use_regexp_matching config option. Regular expression matching is only used in certain object definition directives that contain *, ?, +, or .. A new initial_state directive has been added to host and service definitions, so you can tell Nagios that a host/service should default to a specific state when Nagios starts, rather than UP or OK (which is still the default). 13. Object Inheritance: You can now inherit object variables/values from multiple templates by specifying more than one template name in the use directive of object definitions. This can allow for some very powerful (and complex) inheritance setups. (Read more) Services now inherit contact groups, notification interval, and notification period from their associated host if not otherwise specified. (Read more) 8
  • 9. Host and service escalations now inherit contact groups, notification interval, and escalation timeperiod from their associated host or service if not otherwise specified. (Read more) String variables in host, service, and contact definitions can now be prevented from being inherited by specifying a value of "null" (without quotes) for the value of the variable. (Read more) Most string variables in local object definitions can now be appended to the string values that are inherited. This is quite handy in large configurations. (Read more) 14. Performance Improvements: Add ability to precache object config files and exclude circular path detection checks from verification process. This can speed up Nagios start time immensely in large environments! Read more here. A new use_large_installation_tweaks option has been added that should improve performance in large Nagios installations. Read more about this here. A number of internal improvements have been made with regards to how Nagios deals with internal data structures and object (e.g. host and service) relationships. These improvements should result in a speedup for larger installations. New external_command_buffer_slots option has been added to allow you to more easily scale Nagios in large environments. For best results you should consider using MRTG to graph Nagios’ usage of buffer slots over time. 15. Plugin Output: Multiline plugin output is now supported for host and service checks. Hooray! The plugin API has been updated to support multiple lines of output in a manner that retains backward compatability with older plugins. Additional lines of output (aside from the first line) are now stored in new $LONGHOSTOUTPUT$ and $LONGSERVICEOUTPUT$ macros. The maximum length of plugin output has been increased to 4K (from around 350 bytes in previous versions). This 4K limit has been arbitrarily chosen to protect again runaway plugins that dump back too much data to Nagios. More information on the plugins, multiline output, and max plugin output length can be found here. 16. Service Checks: Nagios now checks for orphaned service checks by default. Added a new enable_predictive_service_dependency_checks option to control whether or not Nagios will initiate predictive check of service that are being depended upon (in dependency definitions). Predictive checks help ensure that the dependency logic is as accurate as possible. (Read more) A new cached service check feature has been implemented that can significantly improve performance for many people Instead of executing a plugin to check the status of a service, Nagios can often use a cached service check result instead. More information on this can be found here. 17. Host Checks: Host checks are now run in parallel! Host checks used to be run in a serial fashion, which meant they were a major holdup in terms of performance. No longer! (Read more) Host check retries are now performed like service check retries. That is to say, host definitions now have a new retry_interval that specifies how much time to wait before trying the host check again. :-) Regularly scheduled host checks now longer hinder performance. In fact, they can help to increase performance with the new cached check logic (see below). Added a new check_for_orphaned_hosts option to enable checks of orphaned host checks. This is need now that host checks are run in parallel. Added a new enable_predictive_host_dependency_checks option to control whether or not Nagios will initiate predictive check of hosts that are being depended upon (in dependency definitions). Predictive checks help ensure that the dependency logic is as accurate as possible. 9
  • 10. (Read more) A new cached host check feature has been implemented that can significantly improve performance for many people Instead of executing a plugin to check the status of a host, Nagios can often use a cached host check result instead. More information on this can be found here. Passive host checks that have a DOWN or UNREACHABLE result can now be automatically translated to their proper state from the point of view of the Nagios instance that receives them. This is very useful in failover and distributed monitoring setups. More information on passive host check state translation can be found here. Passive host checks normally put a host into a HARD state. This can now be changed by enabling the passive_host_checks_are_soft option. 18. Freshness checks: A new freshness_threshold_latency option has been added to allow to you specify the number of seconds that should be added to any host or service freshness threshold that is automatically calculated by Nagios. 19. IPC: The IPC mechanism that is used to transfer host/service check results back to the Nagios daemon from (grand)child processes has changed! This should help to reduce load/latency issues related to processing large numbers of passive checks in distributed monitoring environments. Check results are now transferred by writing check results to files in directory specified by the check_result_path option. Files that are older than the max_check_result_file_age option will be mercilessly deleted without further processing. 20. Timeperiods: Timeperiods were overdue for a major overhaul and have finally been extended to allow for date exceptions, skip dates (every 3 days), etc! This should help you out when defining notification timeperiods for pager rotations. More information on the new timeperiod directives can be found here and here. 21. Event Broker: Updated NEB API version Modified callback for adaptive program status data Added callback for adaptive contact status data Added precheck callbacks for hosts and services to allow modules to cancel/override internal host/service checks. 22. Web Interface: The main splash pages of the web interface are now PHP pages. This will require that you install/enable PHP support on your system if it isn’t already. Hostgroup and servicegroup summaries now show important/unimportant problem breakdowns like the TAC CGI. Minor layout changes to host and service detail views in extinfo CGI. New check statistics and have been added to the "Performance Info" screen. Added Splunk integration options to various CGIs. Integration is controlled by the enable_splunk_integration and splunk_url options in the CGI config file. Added new notes_url_target and action_url_target options to control what frame notes and action URLs are opened in. Added new lock_author_names option to prevent alteration of author names when users submit comments, acknowledgements, and scheduled downtime. 23. Debugging Info: The DEBUGx compile options available in the configure script have been removed. Debugging information can now be written to a separate debug file, which is automatically rotated when it reaches a user-defined size. This should make debugging problems much easier, as you don’t need to recompile Nagios. Full support for writing debugging information to file is being added during the alpha development phase, so it may not be complete when you 10
  • 11. try it. Variables that affect the debug log are debug_file, debug_level, debug_verbosity, and max_debug_file_size. 24. Update Checks: Nagios will now check approximately once a day to see if a new version is available. This is useful to keep on top of security patches and new releases. Update notices will appear in the web interface. Variables that affect the update check are check_for_updates and bare_update_check. 25. Misc: Temp path variable - A new temp_path variable has been added to specify a scratch directory that Nagios can use for temporary scratch space. Unique notification and event ID numbers - A unique ID number is now assigned to each host and service notification. Another unique ID is now assigned to all host and service state changes as well. The unique IDs can be accessed using the following respective macros: $HOSTNOTIFICATIONID$, $SERVICENOTIFICATIONID$, $HOSTEVENTID$, $SERVICEEVENTID$, $LASTHOSTEVENTID$, $LASTSERVICEEVENTID$. New macros - A few new macros (other than those already mentioned elsewhere above) have been added. They include $HOSTGROUPNAMES$, $SERVICEGROUPNAMES$, $HOSTACKAUTHORNAME$, $HOSTACKAUTHORALIAS$, $SERVICEACKAUTHORNAME$, and $SERVICEACKAUTHORALIAS$. Reaper frequency - The old service_reaper_frequency variable has been renamed to check_result_reaper_frequency, as it is now also used to process host check results. Max reaper time - A new max_check_result_reaper_time variable has been added to limit the amount of time a single reaper event is allowed to run. Fractional intervals - Fractional notification and check intervals (e.g. "3.5" minutes) are now supported in host, service, host escalation, and service escalation definitions. Escaped command arguments - You can now pass bang (!) characters in your command arguments by escaping them with a backslash (). If you need to include backslashes in your command arguments, they should also be escaped with a backslash. Multiline system command output - Nagios will now read multiple lines out output from system commands it runs (notification scripts, etc.), up to 4K. This matches the limits on plugin output mentioned earliar. Output from system commands is not directly processed by Nagios, but support for it is there nonetheless. Better scheduling information - More detailed information is given when Nagios is executed with the -s command line option. This information can be used to help reduce the time it takes to start/restart Nagios. Aggregated status file updates - The old aggregate_status_updates option has been removed. All status file updates are now aggregated at a minimum interval of 1 second. New performance data file mode - A new "p" option has been added to the host_perfdata_file_mode and service_perfdata_file_mode options. This new mode will open the file in non-blocking read/write mode, which is useful for pipes. Timezone offset - A new use_timezone option has been added to allow you to run different instances of Nagios in timezones different from the local zone. 11
  • 12. Known Issues Up To: Contents See Also: What’s New Known Issues 1. Timeperiods: Exclusions and Host/Service Checks - There is a bug in the service/host check scheduling logic that rears its head when you use timeperiod definitions that use the exclude directive. The problem occurs when Nagios Core tries to re-schedule the next check. In this case, the scheduling logic may incorrectly schedule the next check further out in the future than it should. In essence, it skips over the (missing) logic where it could determine an earlier possible time using the exception times. Imperfect Solution: Don’t use timeperiod definitions that exclude other timeperods for your host/service check periods. A fix is being worked on, and will hopefully make it into a 3.4.x release. 12
  • 13. Advice for Beginners Up To: Contents See Also: Quickstart Installation Guide Congratulations on choosing Nagios! Nagios is quite powerful and flexible, but it can take a lot of work to get it configured just the way you’d like. Once you become familiar with how it works and what it can do for you, you’ll never want to be without it. :-) Here are some important things to keep in mind for first-time Nagios users: 1. Relax - it’s going to take some time. Don’t expect to be able to get things working exactly the way you want them right off the bat. it’s not that easy. Setting up Nagios can involve a bit of work - partly because of the options that Nagios offers, partly because you need to know what to monitor on your network (and how best to do it). 2. Use the quickstart instructions. The quickstart installation guide is designed to get most new users up and running with a basic Nagios setup fairly quickly. Within 20 minutes you can have Nagios installed and monitoring your local system. Once that’s complete, you can move on to learning how to configure Nagios to do more. 3. Read the documentation. Nagios can be tricky to configure when you’ve got a good grasp of what’s going on, and nearly impossible if you don’t. Make sure you read the documentation (particularly the sections on "Configuring Nagios" and "The Basics"). Save the advanced topics for when you’ve got a good understanding of the basics. 4. Seek the help of others. If you’ve read the documentation, reviewed the sample config files, and are still having problems, send an email message describing your problems to the nagios-users mailing list. Due to the amount of work that I have to do for this project, I am unable to answer most of the questions that get sent directly to me, so your best source of help is going to be the mailing list. If you’ve done some background reading and you provide a good problem description, odds are that someone will give you some pointers on getting things working properly. More information on subscribing to the mailing lists or searching the list archives can be found at http://www.nagios.org/support/. 13
  • 14. Nagios Quickstart Installation Guides Up To: Contents See Also: Upgrading Nagios, Configuration Overview, Security Considerations About Nagios Visit www.nagios.org/about/ for more information on Nagios - including features, capabilities, and technical specifications. Installation Introduction These quickstart guides are intended to provide you with simple instructions on how to install Nagios from source (code) and have it monitoring your local machine inside of 20 minutes. No advanced installation options are discussed here - just the basics that will work for 95% of users who want to get started. Installation Guides Quickstart installation guides are currently available for the following Linux distributions: Fedora Quickstart openSUSE Quickstart Ubuntu Quickstart You can also find additional quickstart guides on the Nagios Community Wiki. Can’t find a quickstart for your particular OS? Write one and post it to the wiki for others! If you are installing Nagios on an operating system or Linux distribution that isn’t listed above, read the Fedora quickstart for an overview of what you’ll need to do. Command names, paths, etc. vary widely across different OSes/distributions, so you’ll likely need to tweak the installation docs a bit to work for your particular case. Post-Installation Modifications Once you get Nagios installed and running properly, you’ll no doubt want to start monitoring more than just your local machine. Check out the following docs for how to go about monitoring other things... Monitoring Windows machines Monitoring Linux/Unix machines Monitoring Netware servers Monitoring routers/switches Monitoring network printers Monitoring publicly available services (HTTP, FTP, SSH, etc.) Enhance Nagios With Community Addons 14
  • 15. Hundreds of community-developed addons provide additional GUIs and reporting, monitoring, and notification functionalities for Nagios. Visit the Nagios Exchange website at exchange.nagios.org to see some really cool things you can use to trick out your Nagios installation. Nagios Support Portal Visit the Nagios Support portal at support.nagios.com for additional documentation, FAQs, and professional Nagios support plans. Nagios and the Nagios logo are trademarks, servicemarks, registered servicemarks or registered trademarks of Nagios Enterprises. 15
  • 16. Upgrading Nagios Up To: Contents See Also: Quickstart Installation Guide Contents Upgrading from previous Nagios 3.x releases Upgrading from Nagios 2.x Upgrading from an RPM installation Upgrading From Previous Nagios 3.x Releases As newer alpha, beta, and stable releases of Nagios 3.x are released, you should strongly consider upgrading as soon as possible. Newer releases usually contain critical bug fixes, so its important to stay up to date. Assuming you’ve already installed Nagios from source code as described in the quickstart guide, you can install newer versions of Nagios 3.x easily. You don’t even need root access to do it, as everything that needed to be done as root was done during the initial install. Here’s the upgrade process... Make sure you have a good backup of your existing Nagios installation and configuration files. If anything goes wrong or doesn’t work, this will allow you to rollback to your old version. Become the nagios user. Debian/Ubuntu users should use sudo -s nagios. su -l nagios Removed the following old HTML files that were used by the web frontend. They have been replaced by PHP equivalents. rm /usr/local/nagios/share/{main,side,index}.html Download the source code tarball of the latest version of Nagios (visit http://www.nagios.org/download/ for the link to the latest version). wget http://osdn.dl.sourceforge.net/sourceforge/nagios/nagios-3.x.tar.gz Extract the Nagios source code tarball. tar xzf nagios-3.x.tar.gz cd nagios-3.x Run the Nagios configure script, passing the name of the group used to control external command file permissions like so: ./configure --with-command-group=nagcmd Compile the Nagios source code. 16
  • 17. make all Install updated binaries, documentation, and web web interface. Your existing configuration files will not be overwritten by this step. make install Verify your configuration files. Correct any errors shown here before proceeding with the next step. /usr/local/nagios/bin/nagios -v /usr/local/nagios/etc/nagios.cfg Restart Nagios. Debian/Ubuntu users should use /etc/init.d/nagios restart. /sbin/service nagios restart That’s it - you’re done! Upgrading From Nagios 2.x It shouldn’t be too difficult to upgrade from Nagios 2.x to Nagios 3. The upgrade is essentially the same as what is described above for upgrading to newer 3.x releases. You will, however, have to change your configuration files a bit so they work with Nagios 3: The old service_reaper_frequency variable in the main config file has been renamed to check_result_reaper_frequency. The old $NOTIFICATIONNUMBER$ macro has been deprecated in favor of new $HOSTNOTIFICATIONNUMBER$ and $SERVICENOTIFICATIONNUMBER$ macros. The old parallelize directive in service definitions is now deprecated and no longer used, as all service checks are run in parallel. The old aggregate_status_updates option has been removed. All status file updates are now aggregated at a minimum interval of 1 second. Extended host and extended service definitions have been deprecated. They are still read and processed by Nagios, but it is recommended that you move the directives found in these definitions to your host and service definitions, respectively. The old downtime_file file variable in the main config file is no longer supported, as scheduled downtime entries are now saved in the retention file. To preserve existing downtime entries, stop Nagios 2.x and append the contents of your old downtime file to the retention file. The old comment_file file variable in the main config file is no longer supported, as comments are now saved in the retention file. To preserve existing comments, stop Nagios 2.x and append the contents of your old comment file to the retention file. Also make sure to read the "What’s New" section of the documentation. It describes all the changes that were made to the Nagios 3 code since the latest stable release of Nagios 2.x. Quite a bit has changed, so make sure you read it over. Upgrading From an RPM Installation If you currently have an RPM- or Debian/Ubuntu APT package-based installation of Nagios and you would like to transition to installing Nagios from the official source code distribution, here’s the basic process you should follow: 1. Stop Nagios 2. Backup your existing Nagios installation Configuration files Main config file (usually nagios.cfg) Resource config file (usually resource.cfg) 17
  • 18. CGI config file (usually cgi.cfg) All your object definition files Retention file (usually retention.dat) Current Nagios log file (usually nagios.log) Archived Nagios log files 3. Uninstall the original RPM or APT package 4. Install Nagios from source by following the quickstart guide 5. Restore your original Nagios configuration files, retention file, and log files 6. Verify your configuration and start Nagios Note that different RPMs or APT packages may install Nagios in different ways and in different locations. Make sure you’ve backed up all your critical Nagios files before removing the original RPM or APT package, so you can revert back if you encounter problems. 18
  • 19. Monitoring Windows Machines Up To: Contents See Also: Quickstart Installation Guide, Monitoring Publicly Available Services Introduction This document describes how you can monitor "private" services and attributes of Windows machines, such as: Memory usage CPU load Disk usage Service states Running processes etc. Publicly available services that are provided by Windows machines (HTTP, FTP, POP3, etc.) can be monitored easily by following the documentation on monitoring publicly available services. Note: These instructions assume that you’ve installed Nagios according to the quickstart guide. The sample configuration entries below reference objects that are defined in the sample config files (commands.cfg, templates.cfg, etc.) that are installed if you follow the quickstart. Overview Monitoring private services or attributes of a Windows machine requires that you install an agent on it. This agent acts as a proxy between the Nagios plugin that does the monitoring and the actual service or attribute of the Windows machine. Without installing an agent on the Windows box, Nagios would be unable to monitor private services or attributes of the Windows box. For this example, we will be installing the NSClient++ addon on the Windows machine and using the check_nt plugin to communicate with the NSClient++ addon. The check_nt plugin should already be installed on the Nagios server if you followed the quickstart guide. 19
  • 20. Other Windows agents (like NC_Net) could be used instead of NSClient++ if you wish - provided you change command and service definitions, etc. a bit. For the sake of simplicity I will only cover using the NSClient++ addon in these instructions. Steps There are several steps you’ll need to follow in order to monitor a new Windows machine. They are: 1. Perform first-time prerequisites 2. Install a monitoring agent on the Windows machine 3. Create new host and service definitions for monitoring the Windows machine 4. Restart the Nagios daemon What’s Already Done For You To make your life a bit easier, a few configuration tasks have already been done for you: A check_nt command definition has been added to the commands.cfg file. This allows you to use the check_nt plugin to monitor Window services. A Windows server host template (called windows-server) has already been created in the templates.cfg file. This allows you to add new Windows host definitions in a simple manner. The above-mentioned config files can be found in the /usr/local/nagios/etc/objects/ directory. You can modify the definitions in these and other definitions to suit your needs better if you’d like. However, I’d recommend waiting until you’re more familiar with configuring Nagios before doing so. For the time being, just follow the directions outlined below and you’ll be monitoring your Windows boxes in no time. Prerequisites The first time you configure Nagios to monitor a Windows machine, you’ll need to do a bit of extra work. Remember, you only need to do this for the *first* Windows machine you monitor. Edit the main Nagios config file. vi /usr/local/nagios/etc/nagios.cfg Remove the leading pound (#) sign from the following line in the main configuration file: #cfg_file=/usr/local/nagios/etc/objects/windows.cfg Save the file and exit. What did you just do? You told Nagios to look to the /usr/local/nagios/etc/objects/windows.cfg to find additional object definitions. That’s where you’ll be adding Windows host and service definitions. That configuration file already contains some sample host, hostgroup, and service definitions. For the *first* Windows machine you monitor, you can simply modify the sample host and service definitions in that file, rather than creating new ones. Installing the Windows Agent Before you can begin monitoring private services and attributes of Windows machines, you’ll need to install an agent on those machines. I recommend using the NSClient++ addon, which can be found at http://sourceforge.net/projects/nscplus. These instructions will take you through a basic installation of the NSClient++ addon, as well as the configuration of Nagios for monitoring the Windows machine. 20
  • 21. 1. Download the latest stable version of the NSClient++ addon from http://sourceforge.net/projects/nscplus 2. Unzip the NSClient++ files into a new C:NSClient++ directory 3. Open a command prompt and change to the C:NSClient++ directory 4. Register the NSClient++ system service with the following command: nsclient++ /install 5. Install the NSClient++ systray with the following command (’SysTray’ is case-sensitive): nsclient++ SysTray 6. Open the services manager and make sure the NSClientpp service is allowed to interact with the desktop (see the ’Log On’ tab of the services manager). If it isn’t already allowed to interact with the desktop, check the box to allow it to. 7. Edit the NSC.INI file (located in the C:NSClient++ directory) and make the following changes: Uncomment all the modules listed in the [modules] section, except for CheckWMI.dll and RemoteConfiguration.dll Optionally require a password for clients by changing the ’password’ option in the [Settings] section. Uncomment the ’allowed_hosts’ option in the [Settings] section. Add the IP address of the Nagios server to this line, or leave it blank to allow all hosts to connect. Make sure the ’port’ option in the [NSClient] section is uncommented and set to ’12489’ (the default port). 8. Start the NSClient++ service with the following command: 21
  • 22. nsclient++ /start 9. If installed properly, a new icon should appear in your system tray. It will be a yellow circle with a black ’M’ inside. 10. Success! The Windows server can now be added to the Nagios monitoring configuration... Configuring Nagios Now it’s time to define some object definitions in your Nagios configuration files in order to monitor the new Windows machine. Open the windows.cfg file for editing. vi /usr/local/nagios/etc/objects/windows.cfg Add a new host definition for the Windows machine that you’re going to monitor. If this is the *first* Windows machine you’re monitoring, you can simply modify the sample host definition in windows.cfg. Change the host_name, alias, and address fields to appropriate values for the Windows box. define host{ use windows-server ; Inherit default values from a Windows server template (make sure you keep this line!) host_name winserver alias My Windows Server address 192.168.1.2 } Good. Now you can add some service definitions (to the same configuration file) in order to tell Nagios to monitor different aspects of the Windows machine. If this is the *first* Windows machine you’re monitoring, you can simply modify the sample service definitions in windows.cfg. Note: Replace "winserver" in the example definitions below with the name you specified in the host_name directive of the host definition you just added. Add the following service definition to monitor the version of the NSClient++ addon that is running on the Windows server. This is useful when it comes time to upgrade your Windows servers to a newer version of the addon, as you’ll be able to tell which Windows machines still need to be upgraded to the latest version of NSClient++. define service{ use generic-service host_name winserver service_description NSClient++ Version check_command check_nt!CLIENTVERSION } Add the following service definition to monitor the uptime of the Windows server. 22
  • 23. define service{ use generic-service host_name winserver service_description Uptime check_command check_nt!UPTIME } Add the following service definition to monitor the CPU utilization on the Windows server and generate a CRITICAL alert if the 5-minute CPU load is 90% or more or a WARNING alert if the 5-minute load is 80% or greater. define service{ use generic-service host_name winserver service_description CPU Load check_command check_nt!CPULOAD!-l 5,80,90 } Add the following service definition to monitor memory usage on the Windows server and generate a CRITICAL alert if memory usage is 90% or more or a WARNING alert if memory usage is 80% or greater. define service{ use generic-service host_name winserver service_description Memory Usage check_command check_nt!MEMUSE!-w 80 -c 90 } Add the following service definition to monitor usage of the C: drive on the Windows server and generate a CRITICAL alert if disk usage is 90% or more or a WARNING alert if disk usage is 80% or greater. define service{ use generic-service host_name winserver service_description C: Drive Space check_command check_nt!USEDDISKSPACE!-l c -w 80 -c 90 } 23
  • 24. Add the following service definition to monitor the W3SVC service state on the Windows machine and generate a CRITICAL alert if the service is stopped. define service{ use generic-service host_name winserver service_description W3SVC check_command check_nt!SERVICESTATE!-d SHOWALL -l W3SVC } Add the following service definition to monitor the Explorer.exe process on the Windows machine and generate a CRITICAL alert if the process is not running. define service{ use generic-service host_name winserver service_description Explorer check_command check_nt!PROCSTATE!-d SHOWALL -l Explorer.exe } That’s it for now. You’ve added some basic services that should be monitored on the Windows box. Save the configuration file. Password Protection If you specified a password in the NSClient++ configuration file on the Windows machine, you’ll need to modify the check_nt command definition to include the password. Open the commands.cfg file for editing. vi /usr/local/nagios/etc/objects/commands.cfg Change the definition of the check_nt command to include the "-s <PASSWORD>" argument (where PASSWORD is the password you specified on the Windows machine) like this: define command{ command_name check_nt command_line $USER1$/check_nt -H $HOSTADDRESS$ -p 12489 -s PASSWORD -v $ARG1$ $ARG2$ } Save the file. Restarting Nagios You’re done with modifying the Nagios configuration, so you’ll need to verify your configuration files and restart Nagios. 24
  • 25. If the verification process produces any errors messages, fix your configuration file before continuing. Make sure that you don’t (re)start Nagios until the verification process completes without any errors! 25
  • 26. Monitoring Linux/Unix Machines Up To: Contents See Also: Quickstart Installation Guide, Monitoring Publicly Available Services Introduction This document describes how you can monitor "private" services and attributes of Linux/UNIX servers, such as: CPU load Memory usage Disk usage Logged in users Running processes etc. Publicly available services that are provided by Linux servers (HTTP, FTP, SSH, SMTP, etc.) can be monitored easily by following the documentation on monitoring publicly available services. Note: These instructions assume that you’ve installed Nagios according to the quickstart guide. The sample configuration entries below reference objects that are defined in the sample config files (commands.cfg, templates.cfg, etc.) that are installed if you follow the quickstart. Overview [Note: This document has not been completed. I would recommend you read the documentation on the NRPE addon for instructions on how to monitor a remote Linux/Unix server.] There are several different ways to monitor attributes or remote Linux/Unix servers. One is by using shared SSH keys and the check_by_ssh plugin to execute plugins on remote servers. This method will not be covered here, but can result in high load on your monitoring server if you are monitoring hundreds or thousands of services. The overhead of setting up/destroying SSH connections is the cause of this. Another common method of monitoring remote Linux/Unix hosts is to use the NRPE addon. NRPE allows you to execute plugins on remote Linux/Unix hosts. This is useful if you need to monitor local resources/attributes like disk usage, CPU load, memory usage, etc. on a remote host. 26
  • 27. 27
  • 28. Monitoring Netware Servers Up To: Contents See Also: Quickstart Installation Guide, Monitoring Publicly Available Services Introduction This document provides information on how you can monitor Novell Netware servers. External Resources You can find documentation on monitoring Netware servers with Nagios at Novell’s Cool Solutions site, including: MRTGEXT: NLM module for MRTG and Nagios Nagios: Host and Service Monitoring Tool Nagios and NetWare: SNMP-based Monitoring Monitor DirXML/IDM Driver States with Nagios Check NDS Login ability with Nagios NDPS/iPrint Print Queue Monitoring by Nagios check_gwiaRL Plugin for Nagios 2.0 Tip: When you visit Novell’s Cool Solutions site, search for "Nagios" to find more articles and software components related to monitoring. Thanks to Christian Mies, Rainer Brunold, and others for contributing Nagios and Netware documentation, addons, etc. on the Novell site! 28
  • 29. Monitoring Network Printers Up To: Contents See Also: Monitoring Publicly Available Services Introduction This document describes how you can monitor the status of networked printers. Specifically, HP printers that have internal/external JetDirect cards/devices, or other print servers (like the Troy PocketPro 100S or the Netgear PS101) that support the JetDirect protocol. The check_hpjd plugin (which is part of the standard Nagios plugins distribution) allows you to monitor the status of JetDirect-capable printers which have SNMP enabled. The plugin is capable of detecting the following printer states: Paper Jam Out of Paper Printer Offline Intervention Required Toner Low Insufficient Memory Open Door Output Tray is Full and more... Note: These instructions assume that you’ve installed Nagios according to the quickstart guide. The sample configuration entries below reference objects that are defined in the sample config files (commands.cfg, templates.cfg, etc.) that are installed if you follow the quickstart. Overview 29
  • 30. Monitoring the status of a networked printer is pretty simple. JetDirect-enabled printers usually have SNMP enabled, which allows Nagios to monitor their status using the check_hpjd plugin. The check_hpjd plugin will only get compiled and installed if you have the net-snmp and net-snmp-utils packages installed on your system. Make sure the plugin exists in /usr/local/nagios/libexec before you continue. If it doesn’t, install net-snmp and net-snmp-utils and recompile/reinstall the Nagios plugins. Steps There are several steps you’ll need to follow in order to monitor a new network printer. They are: 1. Perform first-time prerequisites 2. Create new host and service definitions for monitoring the printer 3. Restart the Nagios daemon What’s Already Done For You To make your life a bit easier, a few configuration tasks have already been done for you: A check_hpjd command definition has been added to the commands.cfg file. This allows you to use the check_hpjd plugin to monitor network printers. A printer host template (called generic-printer) has already been created in the templates.cfg file. This allows you to add new printer host definitions in a simple manner. The above-mentioned config files can be found in the /usr/local/nagios/etc/objects/ directory. You can modify the definitions in these and other definitions to suit your needs better if you’d like. However, I’d recommend waiting until you’re more familiar with configuring Nagios before doing so. For the time being, just follow the directions outlined below and you’ll be monitoring your network printers in no time. Prerequisites The first time you configure Nagios to monitor a network printer, you’ll need to do a bit of extra work. Remember, you only need to do this for the *first* printer you monitor. Edit the main Nagios config file. vi /usr/local/nagios/etc/nagios.cfg Remove the leading pound (#) sign from the following line in the main configuration file: #cfg_file=/usr/local/nagios/etc/objects/printer.cfg Save the file and exit. What did you just do? You told Nagios to look to the /usr/local/nagios/etc/objects/printer.cfg to find additional object definitions. That’s where you’ll be adding host and service definitions for the printer. That configuration file already contains some sample host, hostgroup, and service definitions. For the *first* printer you monitor, you can simply modify the sample host and service definitions in that file, rather than creating new ones. Configuring Nagios You’ll need to create some object definitions in order to monitor a new printer. 30
  • 31. Open the printer.cfg file for editing. vi /usr/local/nagios/etc/objects/printer.cfg Add a new host definition for the networked printer that you’re going to monitor. If this is the *first* printer you’re monitoring, you can simply modify the sample host definition in printer.cfg. Change the host_name, alias, and address fields to appropriate values for the printer. define host{ use generic-printer ; Inherit default values from a template host_name hplj2605dn ; The name we’re giving to this printer alias HP LaserJet 2605dn ; A longer name associated with the printer address 192.168.1.30 ; IP address of the printer hostgroups allhosts ; Host groups this printer is associated with } Now you can add some service definitions (to the same configuration file) to monitor different aspects of the printer. If this is the *first* printer you’re monitoring, you can simply modify the sample service definition in printer.cfg. Note: Replace "hplj2605dn" in the example definitions below with the name you specified in the host_name directive of the host definition you just added. Add the following service definition to check the status of the printer. The service uses the check_hpjd plugin to check the status of the printer every 10 minutes by default. The SNMP community string used to query the printer is "public" in this example. define service{ use generic-service ; Inherit values from a template host_name hplj2605dn ; The name of the host the service is associated with service_description Printer Status ; The service description check_command check_hpjd!-C public ; The command used to monitor the service normal_check_interval 10 ; Check the service every 10 minutes under normal conditions retry_check_interval 1 ; Re-check the service every minute until its final/hard state is determined } Add the following service definition to ping the printer every 10 minutes by default. This is useful for monitoring RTA, packet loss, and general network connectivity. define service{ use generic-service host_name hplj2605dn service_description PING check_command check_ping!3000.0,80%!5000.0,100% normal_check_interval 10 31
  • 32. retry_check_interval 1 } Save the file. Restarting Nagios Once you’ve added the new host and service definitions to the printer.cfg file, you’re ready to start monitoring the printer. To do this, you’ll need to verify your configuration and restart Nagios. If the verification process produces any errors messages, fix your configuration file before continuing. Make sure that you don’t (re)start Nagios until the verification process completes without any errors! 32
  • 33. Monitoring Routers and Switches Up To: Contents See Also: Monitoring Publicly Available Services Introduction This document describes how you can monitor the status of network switches and routers. Some cheaper "unmanaged" switches and hubs don’t have IP addresses and are essentially invisible on your network, so there’s not any way to monitor them. More expensive switches and routers have addresses assigned to them and can be monitored by pinging them or using SNMP to query status information. I’ll describe how you can monitor the following things on managed switches, hubs, and routers: Packet loss, round trip average SNMP status information Bandwidth / traffic rate Note: These instructions assume that you’ve installed Nagios according to the quickstart guide. The sample configuration entries below reference objects that are defined in the sample config files (commands.cfg, templates.cfg, etc.) that are installed when you follow the quickstart. Overview Monitoring switches and routers can either be easy or more involved - depending on what equipment you have and what you want to monitor. As they are critical infrastructure components, you’ll no doubt want to monitor them in at least some basic manner. 33
  • 34. Switches and routers can be monitored easily by "pinging" them to determine packet loss, RTA, etc. If your switch supports SNMP, you can monitor port status, etc. with the check_snmp plugin and bandwidth (if you’re using MRTG) with the check_mrtgtraf plugin. The check_snmp plugin will only get compiled and installed if you have the net-snmp and net-snmp-utils packages installed on your system. Make sure the plugin exists in /usr/local/nagios/libexec before you continue. If it doesn’t, install net-snmp and net-snmp-utils and recompile/reinstall the Nagios plugins. Steps There are several steps you’ll need to follow in order to monitor a new router or switch. They are: 1. Perform first-time prerequisites 2. Create new host and service definitions for monitoring the device 3. Restart the Nagios daemon What’s Already Done For You To make your life a bit easier, a few configuration tasks have already been done for you: Two command definitions (check_snmp and check_local_mrtgtraf) have been added to the commands.cfg file. These allows you to use the check_snmp and check_mrtgtraf plugins to monitor network routers. A switch host template (called generic-switch) has already been created in the templates.cfg file. This allows you to add new router/switch host definitions in a simple manner. The above-mentioned config files can be found in the /usr/local/nagios/etc/objects/ directory. You can modify the definitions in these and other definitions to suit your needs better if you’d like. However, I’d recommend waiting until you’re more familiar with configuring Nagios before doing so. For the time being, just follow the directions outlined below and you’ll be monitoring your network routers/switches in no time. Prerequisites The first time you configure Nagios to monitor a network switch, you’ll need to do a bit of extra work. Remember, you only need to do this for the *first* switch you monitor. Edit the main Nagios config file. vi /usr/local/nagios/etc/nagios.cfg Remove the leading pound (#) sign from the following line in the main configuration file: #cfg_file=/usr/local/nagios/etc/objects/switch.cfg Save the file and exit. What did you just do? You told Nagios to look to the /usr/local/nagios/etc/objects/switch.cfg to find additional object definitions. That’s where you’ll be adding host and service definitions for routers and switches. That configuration file already contains some sample host, hostgroup, and service definitions. For the *first* router/switch you monitor, you can simply modify the sample host and service definitions in that file, rather than creating new ones. Configuring Nagios 34
  • 35. You’ll need to create some object definitions in order to monitor a new router/switch. Open the switch.cfg file for editing. vi /usr/local/nagios/etc/objects/switch.cfg Add a new host definition for the switch that you’re going to monitor. If this is the *first* switch you’re monitoring, you can simply modify the sample host definition in switch.cfg. Change the host_name, alias, and address fields to appropriate values for the switch. define host{ use generic-switch ; Inherit default values from a template host_name linksys-srw224p ; The name we’re giving to this switch alias Linksys SRW224P Switch ; A longer name associated with the switch address 192.168.1.253 ; IP address of the switch hostgroups allhosts,switches ; Host groups this switch is associated with } Monitoring Services Now you can add some service definitions (to the same configuration file) to monitor different aspects of the switch. If this is the *first* switch you’re monitoring, you can simply modify the sample service definition in switch.cfg. Note: Replace "linksys-srw224p" in the example definitions below with the name you specified in the host_name directive of the host definition you just added. Monitoring Packet Loss and RTA Add the following service definition in order to monitor packet loss and round trip average between the Nagios host and the switch every 5 minutes under normal conditions. define service{ use generic-service ; Inherit values from a template host_name linksys-srw224p ; The name of the host the service is associated with service_description PING ; The service description check_command check_ping!200.0,20%!600.0,60% ; The command used to monitor the service normal_check_interval 5 ; Check the service every 5 minutes under normal conditions retry_check_interval 1 ; Re-check the service every minute until its final/hard state is determined } This service will be: CRITICAL if the round trip average (RTA) is greater than 600 milliseconds or the packet loss is 60% or more WARNING if the RTA is greater than 200 ms or the packet loss is 20% or more OK if the RTA is less than 200 ms and the packet loss is less than 20% 35
  • 36. Monitoring SNMP Status Information If your switch or router supports SNMP, you can monitor a lot of information by using the check_snmp plugin. If it doesn’t, skip this section. Add the following service definition to monitor the uptime of the switch. define service{ use generic-service ; Inherit values from a template host_name linksys-srw224p service_description Uptime check_command check_snmp!-C public -o sysUpTime.0 } In the check_command directive of the service definition above, the "-C public" tells the plugin that the SNMP community name to be used is "public" and the "-o sysUpTime.0" indicates which OID should be checked. If you want to ensure that a specific port/interface on the switch is in an up state, you could add a service definition like this: define service{ use generic-service ; Inherit values from a template host_name linksys-srw224p service_description Port 1 Link Status check_command check_snmp!-C public -o ifOperStatus.1 -r 1 -m RFC1213-MIB } In the example above, the "-o ifOperStatus.1" refers to the OID for the operational status of port 1 on the switch. The "-r 1" option tells the check_snmp plugin to return an OK state if "1" is found in the SNMP result (1 indicates an "up" state on the port) and CRITICAL if it isn’t found. The "-m RFC1213-MIB" is optional and tells the check_snmp plugin to only load the "RFC1213-MIB" instead of every single MIB that’s installed on your system, which can help speed things up. That’s it for the SNMP monitoring example. There are a million things that can be monitored via SNMP, so its up to you to decide what you need and want to monitor. Good luck! Tip: You can usually find the OIDs that can be monitored on a switch by running the following command (replace 192.168.1.253 with the IP address of the switch): snmpwalk -v1 -c public 192.168.1.253 -m ALL .1 Monitoring Bandwidth / Traffic Rate If you’re monitoring bandwidth usage on your switches or routers using MRTG, you can have Nagios alert you when traffic rates exceed thresholds you specify. The check_mrtgtraf plugin (which is included in the Nagios plugins distribution) allows you to do this. 36
  • 37. You’ll need to let the check_mrtgtraf plugin know what log file the MRTG data is being stored in, along with thresholds, etc. In my example, I’m monitoring one of the ports on a Linksys switch. The MRTG log file is stored in /var/lib/mrtg/192.168.1.253_1.log. Here’s the service definition I use to monitor the bandwidth data that’s stored in the log file... define service{ use generic-service ; Inherit values from a template host_name linksys-srw224p service_description Port 1 Bandwidth Usage check_command check_local_mrtgtraf!/var/lib/mrtg/192.168.1.253_1.log!AVG!1000000,2000000!5000000,5000000!10 } In the example above, the "/var/lib/mrtg/192.168.1.253_1.log" option that gets passed to the check_local_mrtgtraf command tells the plugin which MRTG log file to read from. The "AVG" option tells it that it should use average bandwidth statistics. The "1000000,2000000" options are the warning thresholds (in bytes) for incoming traffic rates. The "5000000,5000000" are critical thresholds (in bytes) for outgoing traffic rates. The "10" option causes the plugin to return a CRITICAL state if the MRTG log file is older than 10 minutes (it should be updated every 5 minutes). Save the file. Restarting Nagios Once you’ve added the new host and service definitions to the switch.cfg file, you’re ready to start monitoring the router/switch. To do this, you’ll need to verify your configuration and restart Nagios. If the verification process produces any errors messages, fix your configuration file before continuing. Make sure that you don’t (re)start Nagios until the verification process completes without any errors! 37
  • 38. Monitoring Publicly Available Services Up To: Contents See Also: Quickstart Installation Guide Introduction This document describes how you can monitor publicly available services, applications and protocols. By "public" I mean services that are accessible across the network - either the local network or the greater Internet. Examples of public services include HTTP, POP3, IMAP, FTP, and SSH. There are many more public services that you probably use on a daily basis. These services and applications, as well as their underlying protocols, can usually be monitored by Nagios without any special access requirements. Private services, in contrast, cannot be monitored with Nagios without an intermediary agent of some kind. Examples of private services associated with hosts are things like CPU load, memory usage, disk usage, current user count, process information, etc. These private services or attributes of hosts are not usually exposed to external clients. This situation requires that an intermediary monitoring agent be installed on any host that you need to monitor such information on. More information on monitoring private services on different types of hosts can be found in the documentation on: Monitoring Windows machines Monitoring Netware servers Monitoring Linux/Unix machines Tip: Occassionally you will find that information on private services and applications can be monitored with SNMP. The SNMP agent allows you to remotely monitor otherwise private (and inaccessible) information about the host. For more information about monitoring services using SNMP, check out the documentation on monitoring switches and routers. Note: These instructions assume that you’ve installed Nagios according to the quickstart guide. The sample configuration entries below reference objects that are defined in the sample commands.cfg and localhost.cfg config files. Plugins For Monitoring Services When you find yourself needing to monitor a particular application, service, or protocol, chances are good that a plugin exists to monitor it. The official Nagios plugins distribution comes with plugins that can be used to monitor a variety of services and protocols. There are also a large number of contributed plugins that can be found in the contrib/ subdirectory of the plugin distribution. The NagiosExchange.org website hosts a number of additional plugins that have been written by users, so check it out when you have a chance. If you don’t happen to find an appropriate plugin for monitoring what you need, you can always write your own. Plugins are easy to write, so don’t let this thought scare you off. Read the documentation on developing plugins for more information. 38
  • 39. I’ll walk you through monitoring some basic services that you’ll probably use sooner or later. Each of these services can be monitored using one of the plugins that gets installed as part of the Nagios plugins distribution. Let’s get started... Creating A Host Definition Before you can monitor a service, you first need to define a host that is associated with the service. You can place host definitions in any object configuration file specified by a cfg_file directive or placed in a directory specified by a cfg_dir directive. If you have already created a host definition, you can skip this step. For this example, lets say you want to monitor a variety of services on a remote host. Let’s call that host remotehost. The host definition can be placed in its own file or added to an already exiting object configuration file. Here’s what the host definition for remotehost might look like: define host{ use generic-host ; Inherit default values from a template host_name remotehost ; The name we’re giving to this host alias Some Remote Host ; A longer name associated with the host address 192.168.1.50 ; IP address of the host hostgroups allhosts ; Host groups this host is associated with } Now that a definition has been added for the host that will be monitored, we can start defining services that should be monitored. As with host definitions, service definitions can be placed in any object configuration file. Creating Service Definitions For each service you want to monitor, you need to define a service in Nagios that is associated with the host definition you just created. You can place service definitions in any object configuration file specified by a cfg_file directive or placed in a directory specified by a cfg_dir directive. Some example service definitions for monitoring common public service (HTTP, FTP, etc.) are given below. Monitoring HTTP Chances are you’re going to want to monitor web servers at some point - either yours or someone else’s. The check_http plugin is designed to do just that. It understands the HTTP protocol and can monitor response time, error codes, strings in the returned HTML, server certificates, and much more. The commands.cfg file contains a command definition for using the check_http plugin. It looks like this: define command{ name check_http command_name check_http command_line $USER1$/check_http -I $HOSTADDRESS$ $ARG1$ } 39
  • 40. A simple service definition for monitoring the HTTP service on the remotehost machine might look like this: define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description HTTP check_command check_http } This simple service definition will monitor the HTTP service running on remotehost. It will produce alerts if the web server doesn’t respond within 10 seconds or if it returns HTTP errors codes (403, 404, etc.). That’s all you need for basic monitoring. Pretty simple, huh? Tip: For more advanced monitoring, run the check_http plugin manually with --help as a command-line argument to see all the options you can give the plugin. This --help syntax works with all of the plugins I’ll cover in this document. A more advanced definition for monitoring the HTTP service is shown below. This service definition will check to see if the /download/index.php URI contains the string "latest-version.tar.gz". It will produce an error if the string isn’t found, the URI isn’t valid, or the web server takes longer than 5 seconds to respond. define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description Product Download Link check_command check_http!-u /download/index.php -t 5 -s "latest-version.tar.gz" } Monitoring FTP When you need to monitor FTP servers, you can use the check_ftp plugin. The commands.cfg file contains a command definition for using the check_ftp plugin, which looks like this: define command{ command_name check_ftp command_line $USER1$/check_ftp -H $HOSTADDRESS$ $ARG1$ } A simple service definition for monitoring the FTP server on remotehost would look like this: 40
  • 41. define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description FTP check_command check_ftp } This service definition will monitor the FTP service and generate alerts if the FTP server doesn’t respond within 10 seconds. A more advanced service definition is shown below. This service will check the FTP server running on port 1023 on remotehost. It will generate an alert if the server doesn’t respond within 5 seconds or if the server response doesn’t contain the string "Pure-FTPd [TLS]". define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description Special FTP check_command check_ftp!-p 1023 -t 5 -e "Pure-FTPd [TLS]" } Monitoring SSH When you need to monitor SSH servers, you can use the check_ssh plugin. The commands.cfg file contains a command definition for using the check_ssh plugin, which looks like this: define command{ command_name check_ssh command_line $USER1$/check_ssh $ARG1$ $HOSTADDRESS$ } A simple service definition for monitoring the SSH server on remotehost would look like this: define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description SSH check_command check_ssh } This service definition will monitor the SSH service and generate alerts if the SSH server doesn’t respond within 10 seconds. 41
  • 42. A more advanced service definition is shown below. This service will check the SSH server and generate an alert if the server doesn’t respond within 5 seconds or if the server version string string doesn’t match "OpenSSH_4.2". define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description SSH Version Check check_command check_ssh!-t 5 -r "OpenSSH_4.2" } Monitoring SMTP The check_smtp plugin can be using for monitoring your email servers. The commands.cfg file contains a command definition for using the check_smtp plugin, which looks like this: define command{ command_name check_smtp command_line $USER1$/check_smtp -H $HOSTADDRESS$ $ARG1$ } A simple service definition for monitoring the SMTP server on remotehost would look like this: define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description SMTP check_command check_smtp } This service definition will monitor the SMTP service and generate alerts if the SMTP server doesn’t respond within 10 seconds. A more advanced service definition is shown below. This service will check the SMTP server and generate an alert if the server doesn’t respond within 5 seconds or if the response from the server doesn’t contain "mygreatmailserver.com". define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description SMTP Response Check check_command check_smtp!-t 5 -e "mygreatmailserver.com" } 42
  • 43. Monitoring POP3 The check_pop plugin can be using for monitoring the POP3 service on your email servers. The commands.cfg file contains a command definition for using the check_pop plugin, which looks like this: define command{ command_name check_pop command_line $USER1$/check_pop -H $HOSTADDRESS$ $ARG1$ } A simple service definition for monitoring the POP3 service on remotehost would look like this: define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description POP3 check_command check_pop } This service definition will monitor the POP3 service and generate alerts if the POP3 server doesn’t respond within 10 seconds. A more advanced service definition is shown below. This service will check the POP3 service and generate an alert if the server doesn’t respond within 5 seconds or if the response from the server doesn’t contain "mygreatmailserver.com". define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description POP3 Response Check check_command check_pop!-t 5 -e "mygreatmailserver.com" } Monitoring IMAP The check_imap plugin can be using for monitoring IMAP4 service on your email servers. The commands.cfg file contains a command definition for using the check_imap plugin, which looks like this: define command{ command_name check_imap command_line $USER1$/check_imap -H $HOSTADDRESS$ $ARG1$ } A simple service definition for monitoring the IMAP4 service on remotehost would look like this: 43
  • 44. define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description IMAP check_command check_imap } This service definition will monitor the IMAP4 service and generate alerts if the IMAP server doesn’t respond within 10 seconds. A more advanced service definition is shown below. This service will check the IMAP4 service and generate an alert if the server doesn’t respond within 5 seconds or if the response from the server doesn’t contain "mygreatmailserver.com". define service{ use generic-service ; Inherit default values from a template host_name remotehost service_description IMAP4 Response Check check_command check_imap!-t 5 -e "mygreatmailserver.com" } Restarting Nagios Once you’ve added the new host and service definitions to your object configuration file(s), you’re ready to start monitoring them. To do this, you’ll need to verify your configuration and restart Nagios. If the verification process produces any errors messages, fix your configuration file before continuing. Make sure that you don’t (re)start Nagios until the verification process completes without any errors! 44
  • 45. Configuration Overview Up To: Contents See Also: Main Configuration File, Object Configuration Overview, CGI Configuration File Introduction There are several different configuration files that you’re going to need to create or edit before you start monitoring anything. Be patient! Configuring Nagios can take quite a while, especially if you’re first-time user. Once you figure out how things work, it’ll all be well worth your time. :-) Note: Sample configuration files are installed in the /usr/local/nagios/etc/ directory when you follow the quickstart installation guide. Main Configuration File The main configuration file contains a number of directives that affect how the Nagios daemon operates. This config file is read by both the Nagios daemon and the CGIs. This is where you’re going to want to get started in your configuration adventures. Documentation for the main configuration file can be found here. 45
  • 46. Resource File(s) Resource files can be used to store user-defined macros. The main point of having resource files is to use them to store sensitive configuration information (like passwords), without making them available to the CGIs. You can specify one or more optional resource files by using the resource_file directive in your main configuration file. Object Definition Files Object definition files are used to define hosts, services, hostgroups, contacts, contactgroups, commands, etc. This is where you define all the things you want monitor and how you want to monitor them. You can specify one or more object definition files by using the cfg_file and/or cfg_dir directives in your main configuration file. An introduction to object definitions, and how they relate to each other, can be found here. CGI Configuration File The CGI configuration file contains a number of directives that affect the operation of the CGIs. It also contains a reference the main configuration file, so the CGIs know how you’ve configured Nagios and where your object defintions are stored. Documentation for the CGI configuration file can be found here. 46
  • 47. Main Configuration File Options Up To: Contents Notes When creating and/or editing configuration files, keep the following in mind: 1. Lines that start with a ’#’ character are taken to be comments and are not processed 2. Variables names must begin at the start of the line - no white space is allowed before the name 3. Variable names are case-sensitive Sample Configuration File Tip: A sample main configuration file (/usr/local/nagios/etc/nagios.cfg) is installed for you when you follow the quickstart installation guide. Config File Location The main configuration file is usually named nagios.cfg and located in the /usr/local/nagios/etc/ directory. Configuration File Variables Below you will find descriptions of each main Nagios configuration file option... Log File Format: log_file=<file_name> Example: log_file=/usr/local/nagios/var/nagios.log This variable specifies where Nagios should create its main log file. This should be the first variable that you define in your configuration file, as Nagios will try to write errors that it finds in the rest of your configuration data to this file. If you have log rotation enabled, this file will automatically be rotated every hour, day, week, or month. Object Configuration File Format: cfg_file=<file_name> Example: cfg_file=/usr/local/nagios/etc/hosts.cfg cfg_file=/usr/local/nagios/etc/services.cfg cfg_file=/usr/local/nagios/etc/commands.cfg 47
  • 48. This directive is used to specify an object configuration file containing object definitions that Nagios should use for monitoring. Object configuration files contain definitions for hosts, host groups, contacts, contact groups, services, commands, etc. You can seperate your configuration information into several files and specify multiple cfg_file= statements to have each of them processed. Object Configuration Directory Format: cfg_dir=<directory_name> Example: cfg_dir=/usr/local/nagios/etc/commands cfg_dir=/usr/local/nagios/etc/services cfg_dir=/usr/local/nagios/etc/hosts This directive is used to specify a directory which contains object configuration files that Nagios should use for monitoring. All files in the directory with a .cfg extension are processed as object config files. Additionally, Nagios will recursively process all config files in subdirectories of the directory you specify here. You can seperate your configuration files into different directories and specify multiple cfg_dir= statements to have all config files in each directory processed. Object Cache File Format: object_cache_file=<file_name> Example: object_cache_file=/usr/local/nagios/var/objects.cache This directive is used to specify a file in which a cached copy of object definitions should be stored. The cache file is (re)created every time Nagios is (re)started and is used by the CGIs. It is intended to speed up config file caching in the CGIs and allow you to edit the source object config files while Nagios is running without affecting the output displayed in the CGIs. Precached Object File Format: precached_object_file=<file_name> Example: precached_object_file=/usr/local/nagios/var/objects.precache This directive is used to specify a file in which a pre-processed, pre-cached copy of object definitions should be stored. This file can be used to drastically improve startup times in large/complex Nagios installations. Read more information on how to speed up start times here. Resource File Format: resource_file=<file_name> Example: resource_file=/usr/local/nagios/etc/resource.cfg This is used to specify an optional resource file that can contain $USERn$ macro definitions. $USERn$ macros are useful for storing usernames, passwords, and items commonly used in command definitions (like directory paths). The CGIs will not attempt to read resource files, so you can set restrictive permissions (600 or 660) on them to protect sensitive information. You can include multiple resource 48
  • 49. files by adding multiple resource_file statements to the main config file - Nagios will process them all. See the sample resource.cfg file in the sample-config/ subdirectory of the Nagios distribution for an example of how to define $USERn$ macros. Temp File Format: temp_file=<file_name> Example: temp_file=/usr/local/nagios/var/nagios.tmp This is a temporary file that Nagios periodically creates to use when updating comment data, status data, etc. The file is deleted when it is no longer needed. Temp Path Format: temp_path=<dir_name> Example: temp_path=/tmp This is a directory that Nagios can use as scratch space for creating temporary files used during the monitoring process. You should run tmpwatch, or a similiar utility, on this directory occassionally to delete files older than 24 hours. Status File Format: status_file=<file_name> Example: status_file=/usr/local/nagios/var/status.dat This is the file that Nagios uses to store the current status, comment, and downtime information. This file is used by the CGIs so that current monitoring status can be reported via a web interface. The CGIs must have read access to this file in order to function properly. This file is deleted every time Nagios stops and recreated when it starts. Status File Update Interval Format: status_update_interval=<seconds> Example: status_update_interval=15 This setting determines how often (in seconds) that Nagios will update status data in the status file. The minimum update interval is 1 second. Nagios User Format: nagios_user=<username/UID> Example: nagios_user=nagios 49
  • 50. This is used to set the effective user that the Nagios process should run as. After initial program startup and before starting to monitor anything, Nagios will drop its effective privileges and run as this user. You may specify either a username or a UID. Nagios Group Format: nagios_group=<groupname/GID> Example: nagios_group=nagios This is used to set the effective group that the Nagios process should run as. After initial program startup and before starting to monitor anything, Nagios will drop its effective privileges and run as this group. You may specify either a groupname or a GID. Notifications Option Format: enable_notifications=<0/1> Example: enable_notifications=1 This option determines whether or not Nagios will send out notifications when it initially (re)starts. If this option is disabled, Nagios will not send out notifications for any host or service. Note: If you have state retention enabled, Nagios will ignore this setting when it (re)starts and use the last known setting for this option (as stored in the state retention file), unless you disable the use_retained_program_state option. If you want to change this option when state retention is active (and the use_retained_program_state is enabled), you’ll have to use the appropriate external command or change it via the web interface. Values are as follows: 0 = Disable notifications 1 = Enable notifications (default) Service Check Execution Option Format: execute_service_checks=<0/1> Example: execute_service_checks=1 This option determines whether or not Nagios will execute service checks when it initially (re)starts. If this option is disabled, Nagios will not actively execute any service checks and will remain in a sort of "sleep" mode (it can still accept passive checks unless you’ve disabled them). This option is most often used when configuring backup monitoring servers, as described in the documentation on redundancy, or when setting up a distributed monitoring environment. Note: If you have state retention enabled, Nagios will ignore this setting when it (re)starts and use the last known setting for this option (as stored in the state retention file), unless you disable the use_retained_program_state option. If you want to change this option when state retention is active (and the use_retained_program_state is enabled), you’ll have to use the appropriate external command or change it via the web interface. Values are as follows: 0 = Don’t execute service checks 1 = Execute service checks (default) 50
  • 51. Passive Service Check Acceptance Option Format: accept_passive_service_checks=<0/1> Example: accept_passive_service_checks=1 This option determines whether or not Nagios will accept passive service checks when it initially (re)starts. If this option is disabled, Nagios will not accept any passive service checks. Note: If you have state retention enabled, Nagios will ignore this setting when it (re)starts and use the last known setting for this option (as stored in the state retention file), unless you disable the use_retained_program_state option. If you want to change this option when state retention is active (and the use_retained_program_state is enabled), you’ll have to use the appropriate external command or change it via the web interface. Values are as follows: 0 = Don’t accept passive service checks 1 = Accept passive service checks (default) Host Check Execution Option Format: execute_host_checks=<0/1> Example: execute_host_checks=1 This option determines whether or not Nagios will execute on-demand and regularly scheduled host checks when it initially (re)starts. If this option is disabled, Nagios will not actively execute any host checks, although it can still accept passive host checks unless you’ve disabled them). This option is most often used when configuring backup monitoring servers, as described in the documentation on redundancy, or when setting up a distributed monitoring environment. Note: If you have state retention enabled, Nagios will ignore this setting when it (re)starts and use the last known setting for this option (as stored in the state retention file), unless you disable the use_retained_program_state option. If you want to change this option when state retention is active (and the use_retained_program_state is enabled), you’ll have to use the appropriate external command or change it via the web interface. Values are as follows: 0 = Don’t execute host checks 1 = Execute host checks (default) Passive Host Check Acceptance Option Format: accept_passive_host_checks=<0/1> Example: accept_passive_host_checks=1 This option determines whether or not Nagios will accept passive host checks when it initially (re)starts. If this option is disabled, Nagios will not accept any passive host checks. Note: If you have state retention enabled, Nagios will ignore this setting when it (re)starts and use the last known setting for this option (as stored in the state retention file), unless you disable the use_retained_program_state option. If you want to change this option when state retention is active (and the use_retained_program_state is enabled), you’ll have to use the appropriate external command or change it via the web interface. Values are as follows: 51
  • 52. 0 = Don’t accept passive host checks 1 = Accept passive host checks (default) Event Handler Option Format: enable_event_handlers=<0/1> Example: enable_event_handlers=1 This option determines whether or not Nagios will run event handlers when it initially (re)starts. If this option is disabled, Nagios will not run any host or service event handlers. Note: If you have state retention enabled, Nagios will ignore this setting when it (re)starts and use the last known setting for this option (as stored in the state retention file), unless you disable the use_retained_program_state option. If you want to change this option when state retention is active (and the use_retained_program_state is enabled), you’ll have to use the appropriate external command or change it via the web interface. Values are as follows: 0 = Disable event handlers 1 = Enable event handlers (default) Log Rotation Method Format: log_rotation_method=<n/h/d/w/m> Example: log_rotation_method=d This is the rotation method that you would like Nagios to use for your log file. Values are as follows: n = None (don’t rotate the log - this is the default) h = Hourly (rotate the log at the top of each hour) d = Daily (rotate the log at midnight each day) w = Weekly (rotate the log at midnight on Saturday) m = Monthly (rotate the log at midnight on the last day of the month) Log Archive Path Format: log_archive_path=<path> Example: log_archive_path=/usr/local/nagios/var/archives/ This is the directory where Nagios should place log files that have been rotated. This option is ignored if you choose to not use the log rotation functionality. External Command Check Option Format: check_external_commands=<0/1> Example: check_external_commands=1 52
  • 53. This option determines whether or not Nagios will check the command file for commands that should be executed. This option must be enabled if you plan on using the command CGI to issue commands via the web interface. More information on external commands can be found here. 0 = Don’t check external commands 1 = Check external commands (default) External Command Check Interval Format: command_check_interval=<xxx>[s] Example: command_check_interval=1 If you specify a number with an "s" appended to it (i.e. 30s), this is the number of seconds to wait between external command checks. If you leave off the "s", this is the number of "time units" to wait between external command checks. Unless you’ve changed the interval_length value (as defined below) from the default value of 60, this number will mean minutes. Note: By setting this value to -1, Nagios will check for external commands as often as possible. Each time Nagios checks for external commands it will read and process all commands present in the command file before continuing on with its other duties. More information on external commands can be found here. External Command File Format: command_file=<file_name> Example: command_file=/usr/local/nagios/var/rw/nagios.cmd This is the file that Nagios will check for external commands to process. The command CGI writes commands to this file. The external command file is implemented as a named pipe (FIFO), which is created when Nagios starts and removed when it shuts down. If the file exists when Nagios starts, the Nagios process will terminate with an error message. More information on external commands can be found here. External Command Buffer Slots Format: external_command_buffer_slots=<#> Example: external_command_buffer_slots=512 Note: This is an advanced feature. This option determines how many buffer slots Nagios will reserve for caching external commands that have been read from the external command file by a worker thread, but have not yet been processed by the main thread of the Nagios deamon. Each slot can hold one external command, so this option essentially determines how many commands can be buffered. For installations where you process a large number of passive checks (e.g. distributed setups), you may need to increase this number. You should consider using MRTG to graph Nagios’ usage of external command buffers. You can read more on how to configure graphing here. Update Checks 53
  • 54. Format: check_for_updates=<0/1> Example: check_for_updates=1 This option determines whether Nagios will automatically check to see if new updates (releases) are available. It is recommend that you enable this option to ensure that you stay on top of the latest critical patches to Nagios. Nagios is critical to you - make sure you keep it in good shape. Nagios will check once a day for new updates. Data collected by Nagios Enterprises from the update check is processed in accordance with our privacy policy - see http://api.nagios.org for details. Bare Update Checks Format: bare_update_checks=<0/1> Example: bare_update_checks This option deterines what data Nagios will send to api.nagios.org when it checks for updates. By default, Nagios will send information on the current version of Nagios you have installed, as well as an indicator as to whether this was a new installation or not. Nagios Enterprises uses this data to determine the number of users running specific version of Nagios. Enable this option if you do not wish for this information to be sent. Lock File Format: lock_file=<file_name> Example: lock_file=/tmp/nagios.lock This option specifies the location of the lock file that Nagios should create when it runs as a daemon (when started with the -d command line argument). This file contains the process id (PID) number of the running Nagios process. State Retention Option Format: retain_state_information=<0/1> Example: retain_state_information=1 This option determines whether or not Nagios will retain state information for hosts and services between program restarts. If you enable this option, you should supply a value for the state_retention_file variable. When enabled, Nagios will save all state information for hosts and service before it shuts down (or restarts) and will read in previously saved state information when it starts up again. 0 = Don’t retain state information 1 = Retain state information (default) State Retention File 54
  • 55. Format: state_retention_file=<file_name> Example: state_retention_file=/usr/local/nagios/var/retention.dat This is the file that Nagios will use for storing status, downtime, and comment information before it shuts down. When Nagios is restarted it will use the information stored in this file for setting the initial states of services and hosts before it starts monitoring anything. In order to make Nagios retain state information between program restarts, you must enable the retain_state_information option. Automatic State Retention Update Interval Format: retention_update_interval=<minutes> Example: retention_update_interval=60 This setting determines how often (in minutes) that Nagios will automatically save retention data during normal operation. If you set this value to 0, Nagios will not save retention data at regular intervals, but it will still save retention data before shutting down or restarting. If you have disabled state retention (with the retain_state_information option), this option has no effect. Use Retained Program State Option Format: use_retained_program_state=<0/1> Example: use_retained_program_state=1 This setting determines whether or not Nagios will set various program-wide state variables based on the values saved in the retention file. Some of these program-wide state variables that are normally saved across program restarts if state retention is enabled include the enable_notifications, enable_flap_detection, enable_event_handlers, execute_service_checks, and accept_passive_service_checks options. If you do not have state retention enabled, this option has no effect. 0 = Don’t use retained program state 1 = Use retained program state (default) Use Retained Scheduling Info Option Format: use_retained_scheduling_info=<0/1> Example: use_retained_scheduling_info=1 This setting determines whether or not Nagios will retain scheduling info (next check times) for hosts and services when it restarts. If you are adding a large number (or percentage) of hosts and services, I would recommend disabling this option when you first restart Nagios, as it can adversely skew the spread of initial checks. Otherwise you will probably want to leave it enabled. 0 = Don’t use retained scheduling info 1 = Use retained scheduling info (default) 55